Week 2

studied byStudied by 8 people
0.0(0)
get a hint
hint

When configuring a GPO linked to a domain, which policy configuration setting would you use to control the following?

  • Password settings

  • Account lockout settings

  • Kerberos settings

1 / 167

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

168 Terms

1

When configuring a GPO linked to a domain, which policy configuration setting would you use to control the following?

  • Password settings

  • Account lockout settings

  • Kerberos settings

Account Policies

New cards
2

There are Registry-based settings that can be configured within a GPO to control the computer and the overall user experience, such as:

  • Use of Windows features such as BitLocker, offline files, and Parental Controls

  • Customize the Start menu, taskbar, or desktop environment

  • Control notifications

  • Restrict access to Control Panel features

  • Configure Internet Explorer features and options

What are these settings known as?

Administrative Templates

New cards
3

Drag each GPO category on the left to the associated policy on the right.

Software that should be installed on a specific computer

Computer Configuration policies

Internet Explorer user settings

User Configuration policies

Scripts that should run at logon or logoff

User Configuration policies

Network communication security settings

Computer Configuration policies

Password restrictions that must be met for all user accounts

Computer Configuration policies

Software that should be installed for a specific user

User Configuration policies

Scripts that should run at startup or shutdown

Computer Configuration policies

New cards
4

You manage a large number of workstations that belong to a Windows domain. You want to prevent anyone that might try to gain access to a computer from guessing login information by trying multiple passwords.

Which GPO contains a policy you can enable to guard all computers in the domain against this security breach?

Default Domain Policy

New cards
5

You have several computers running Windows 11. The computers are members of a domain.

For all computers, you want to remove access to administrative tools from the Start menu and hide notifications from the System Tray.

What should you do?

Use Group Policy

New cards
6

You are managing a workstation that is not part of a Windows domain. Users on this computer should not be permitted to download applications from the Windows Store.

Which administration tool can you use to enable a policy that turns off the Store application for all users on this computer?

Local Group Policy Editor

New cards
7

A user has complained about being unable to remove a program that is no longer needed on a computer. The Programs and Features page is not available in Control Panel.

You suspect that a policy is enabled that hides this page from the user. But after opening the Local Group Policy Editor, you see that the Hide Programs and Features page is set to Not configured. You know that other users in this domain can access the Programs and Features page.

To determine whether the policy is enabled, where should you look next?

GPOs linked to organizational units that contain this user's object.

New cards
8

The Hide Programs and Features page setting is configured for a specific user as follows:

Policy

Setting

Local Group Policy

Enabled

Default Domain Policy GPO

Not configured

GPO linked to the user's organizational unit

Disabled

After logging in, the user is able to see the Programs and Features page. Why does this happen?

The GPO linked to the user's organizational unit is applied last so this setting takes precedence.

New cards
9

Which of the following includes the Policy Analyzer?

Security Compliance Toolkit (SCT)

New cards
10

Drag each Group Policy setting on the left to the description of how the setting is enforced on the right.

Causes the policy to be enforced.

Enabled

Does not change the current setting for the policy.

Not configured

Prevents the policy from being enforced.

Disabled

New cards
11

Which of the following is a valid Azure AD password?

My Password

New cards
12

Which of the following is a password restriction that applies to Azure AD?

There is a global banned password list.

New cards
13

Which setting would you set to 0 to allow all users to reset their password immediately?

Minimum password age

New cards
14

How many old passwords can Windows remember?

24

New cards
15

Which of the following is the option provided by Azure AD for users that forget their password or get locked out of their account?

SSPR

New cards
16

How many characters can be entered before the "@" symbol, and how many characters can be entered after the "@" symbol in a UPN?

64 before and 48 after the "@" symbol

New cards
17

Which of the following character types are allowed in a UPN? (Select two.)

!
#

New cards
18

When a user creates a new password, the strength of the password goes through a series of evaluation steps, then is compared to the banned password lists. The second step in the evaluation checks the password to determine if it should be banned.

Which of the following checks the password to see if it matches any passwords on the global or custom lists?

Fuzzy matching

New cards
19

Your company recently implemented the Banned Passwords List for the domain. You want to ensure that all active passwords are checked against the lists. Which of the following would be the BEST way to accomplish this?

Require all users to change their passwords.

New cards
20

Which group is the Allow log on locally right assigned to by default for workstations and member servers?

Administrators

New cards
21

Which of the following can be configured using permissions?

Deny access to files

New cards
22

Click on the user right policy that is used to grant a user local access to the desktop of a Windows server.

Allow log on locally

New cards
23

You are managing rights on a standalone server. You want to make changes to the settings of the Restore files and directories policy.

Which of the following is the tool you must use to make changes to this policy?

Local Group Policy Editor

New cards
24

Permissions give you the ability to do which of the following?

Access a printer

New cards
25

Which of the following requires rights to perform the action?

Allow members of the IT group to back up the files in the Sales folder on the SalesData server.

New cards
26

Select the policy node you would choose to configure who is allowed to manage the auditing and security logs.

User Rights Assignment

New cards
27

You have several servers running Windows Server 2022 and a corporate domain controller. Which of the following is part of a strategy to manage user credential exposure using non-configurable protections?

Protected Users security group

New cards
28

Which of the following can be added to the Protected Users group?

User accounts

New cards
29

Which of the following are deployment requirements for using protected accounts? (Select two.)

Domain functional level of Windows 2012 R2 or later

Windows 8.1 or Windows Server 2012 R2 or later

New cards
30

You are the network administrator for your company. Rodney, a user in the research department, shares a computer with two other users. One day, Rodney notices that some of his documents have been deleted from the computer's local hard drive. You restore the documents from a recent backup. Rodney now wants you to configure the computer, so he can track all users who delete his documents in the future.

You enable auditing of successful object access events in the computer's local security policy. Rodney then logs on and creates a sample document. To test auditing, you then log on and delete the document. However, when you examine the computer's security log, no auditing events are listed.

How can you make sure an event is listed in the security log whenever one of Rodney's documents is deleted?

Edit the advanced security properties of the folder containing Rodney's documents. Configure an auditing entry for the Everyone group. Configure the entry to audit the success of the Delete permission.

New cards
31

You are the security administrator for your organization. Your multiple-domain Active Directory forest uses Windows servers for domain controllers and member servers. The computer accounts for your member servers are located in the Member Servers OU. Computer accounts for domain controllers are in the Domain Controllers OU. Computer accounts for workstations are located in the Workstations OU.

You are creating a security template that you plan to import into a GPO.

What should you do to log whenever a user is unable to log on to any computer using a domain user account? (Select two. Each choice is a required part of the solution.)

Enable the logging of failed account logon events.

Link the GPO to the Domain Controllers OU.

New cards
32

You are the network administrator for your company. All computers are joined to a single Active Directory domain. Several computers store sensitive information.

You are configuring security settings that will be distributed to all computers on your network. You want to identify attempts to break into a computer by having the computer that denies the authentication attempt note the failed attempt in its security database.

How can you create a policy that meets these requirements?

Select Audit Failure for the enabled audit policy.

New cards
33

You are an administrator for a company that uses Windows servers. In addition to Active Directory, you provide file and print services, DHCP, DNS, and email services. There is a single domain and a single site. There are two member servers, one that handles file and print services only and one database server. You are considering adding additional servers as business increases.

Your company produces mass mailings for its customers. The mailing list and contact information provided to your company by its clients are strictly confidential. Because of the private information sometimes contained in the data (one of your clients is a hospital) and because of the importance of the data to your operation, the data can also be considered a trade secret.

You want to ensure the data stored on your member servers is only accessed by authorized personnel for business purposes. You've set file permissions to restrict access, but you want to track the authorized users.

How should you configure your security policy to track access to the data files?

Configure Object Access auditing in a GPO and link it to the domain.

New cards
34

You are consulting with the owner of a small network with a Windows server functioning as a workgroup server. There are six Windows desktop computers. There is no internet connectivity.

The server contains possibly sensitive information, so the owner wants to ensure that no unauthorized access occurs. You suggest that auditing be configured so that access to sensitive files can be tracked.

What can you do to ensure that the files generate audit results? (Select three. Each correct answer is part of the required solution.)

Make sure the correct users and groups are listed in the auditing properties of the files.

Make sure the files to be audited are on NTFS partitions.

Make sure the Object Access auditing policy is configured for success and failure.

New cards
35

You suspect that sensitive information has been leaked. Which audit logs could you review to track who opened a file containing the sensitive data?

Object Access

New cards
36

You manage a single domain named widgets.com.

This morning, you noticed that a trust relationship you established with another forest has changed. You reconfigured the trust, but you want to be able to identify if this change happens again in the future. You want to configure auditing to track this event.

Which auditing category should you enable?

Policy Change events

New cards
37

You are in charge of managing the servers in your network. Recently, you have noticed that many of the domain member servers are being shut down.

You would like to use auditing to track who performs these actions.

What should you do only to monitor the necessary events and no others? (Select two. Each choice is a required part of the solution.)

Audit successful system events.

Create a GPO to configure auditing. Link the GPO to the domain.

New cards
38

Privilege use tracks which of the following? (Select two.)

When an administrator takes ownership of an object.

When a user exercises a user right.

New cards
39

You have been asked to troubleshoot a Windows workstation that is a member of your domain.

The director who uses the machine said he can install anything he wants and change system settings on demand. He has asked you to figure out why User Account Control (UAC) is not being activated when he performs a sensitive operation.

You verify that the director's user account is a standard user and not a member of the local Administrators group. You want the UAC prompt to show.

What should you do?

Enable the Run all administrators in Admin Approval Mode setting in the Group Policy.

New cards
40

You manage 20 Windows workstations in your domain network.

You want to prevent the sales team members from making system changes. Whenever a change is initiated, you want to allow only those who can enter administrator credentials to be able to make the change.

What should you do?

Configure the User Account Control: Behavior of the elevation prompt for standard users setting in Group Policy to prompt for credentials.

New cards
41

Under which security option category would you enable a prompt for users to change their password before it expires?

Interactive logon

New cards
42

You have a computer running Windows.

Prior to installing some software, you turn off User Account Control (UAC), reboot the computer, and install the software. You turn UAC back on, but it does not prompt you before performing sensitive actions.

You want the protection of UAC, but it is not working at all.

What should you do?

Reboot the machine.

New cards
43

You manage several Windows workstations in your domain. You want to configure a GPO that will make them prompt for additional credentials whenever a sensitive action is taken.

What should you do?

Configure User Account Control (UAC) settings.

New cards
44

If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting?

User Account Control

New cards
45

Which UAC level is recommended as the most secure configuration option because it will always provide a standard user the option to log in as an administrator?

Always notify

New cards
46

Group Policies can be used to set the same notification levels at the domain level that can be set for local machines using the User Account Control (UAC) tool. You need to configure the Notify me only when programs try to make changes to my computer notification level using Group Policy.

Which of the following Group Policies must be set to complete this configuration?

  • The Behavior of the elevation prompt for administrators in Admin Approval Mode policy setting is set to Prompt for consent for non-Windows binaries.

  • The User Account Control: Switch to the secure desktop when prompting for elevation policy setting is enabled.

New cards
47

Which of the following UAC levels prompts the user only when a program tries to change the computer or a program not included with Windows attempts to modify Windows settings?

Notify me only when apps try to make changes to my computer (do not dim my desktop)

New cards
48

User Account Control (UAC) is a tool that generates an alert when a task or operation needs administrative privileges. You use the UAC settings in Control Panel to configure the sensitivity of UAC.

Drag the UAC notification level on the left to the appropriate description of what it does on the right.

The user is prompted only when programs try to make changes to the computer or Windows settings. The secure desktop is not displayed.

Notify me only when apps try to make changes to my computer (do not dim the desktop)

A UAC prompt and the secure desktop are displayed for 150 seconds. The user cannot perform any other actions until they respond to the prompt.

Always notify

The user is prompted only when programs try to make changes to the computer or Windows settings. The secure desktop is displayed for 150 seconds.

Notify me only when apps try to make changes to my computer

If logged on as a standard user, all actions requiring privilege elevation are automatically denied.

Never notify

New cards
49

You have just deployed a new Windows Server 2022 domain controller and want to configure it to apply application allowlisting. Which of the following should be enabled?

Device Guard

New cards
50

You are the administrator of several branch offices. The locations are not large enough to provide adequate physical security for a local domain controller. You plan to deploy Read-only domain controllers (RODCs).

Which of the following would facilitate faster logins for the branch staff?

Enable credential caching.

New cards
51

When hardening a domain controller, it is important to configure network communications to help protect the domain controller from an outside attack.

Which of the following actions should be taken?

Prevent domain controllers from directly communicating with hosts on the internet.

New cards
52

As part of a new installation, you are deploying a domain controller. To prevent malicious actors from trying to gain access to the domain controller, you want to take all the necessary steps to harden the domain controller.

Which of the following installation options for Windows Server 2022 should be used?

Server Core

New cards
53

Due to a recent acquisition, your company now has several small branch offices. The physical security for the local server is minimal, and you need to provide Active Directory Domain Services for the branch users.

Which of the following should you deploy at the branch office?

Read-only domain controller (RODC)

New cards
54

When configuring access to your domain controllers, you want to provide a more secure method that limits which accounts or groups can have access. You also want to limit the time an account or group can access the domain controller using Kerberos Ticket Granting Ticket (TGT). Move the correct actions from the left to the right, and then place them in the order.

  1. Create an authentication policy.

  2. Create an authentication policy silo.

  3. Assign the authentication policy silo to the user, computer, or managed service accounts.

New cards
55

Which of the following would you link to an authentication policy silo to only allow specific accounts access to particular sensitive servers?

silo claim

New cards
56

Authentication policy silos provide a way to define high-privilege credentials between the user, computer, and managed service accounts. Which of the following is true about authentication policy silos?

Each account can only belong to one silo.

New cards
57

Kerberos single sign-on authentication is made up of several components. Match the component on the left with the definition on the right. (Each item may be used once, more than once, or not at all.)

Provides or holds network resources

Service server (SS)

Grants tickets that are valid for specific resources on specific servers

Ticket-granting server (TGS)

A single entity that combines the authentication server and ticket-granting server

Empty

Accepts and processes authentication requests

Authentication server (AS)

New cards
58

Which of the following is a single sign-on authentication and authorization service based on a time-sensitive, ticket-granting system that is used in conjunction with authentication policies?

Kerberos

New cards
59

An anti-malware program uses a heuristic-based analysis to detect which of the following? (Select two.)

Zero-day attacks

Second-generation malware

New cards
60

The very best security measures can be rendered useless by a simple misconfiguration error. Missing a setting or forgetting to check a box can create a vulnerability. To prevent this type of error, ensure that the server implementation is well thought out. Plan your configuration, accounts, permissions, restrictions, and policies. Test your configurations both before and after implementation.

Which of the following should be considered to avoid misconfigurations that can create vulnerabilities?

Implement secure administrative hosts.

New cards
61

Microsoft releases patches for their operating systems and other software products on the second Tuesday of every month - "Patch Tuesday."

Which of the following is a patch management best practice?

Test the results of the update by applying it first in a test environment before applying it to servers on the network.

New cards
62

To ensure the overall security of a system when applications are installed and configured to use an Active Directory account, what principle should be applied?

Least privilege

New cards
63

Custom applications and databases can be susceptible to certain web attacks and should be configured to prevent attacks such as SQL injection. Which of the following is a type of SQL injection where malicious code is saved onto an otherwise benign site?

Cross-site Scripting (XSS)

New cards
64

Microsoft Defender for Identity uses an AD DS account with read permission to all AD DS objects.

Which of the following would be included?

Deleted Objects container

New cards
65

Defender for Identity highlights malicious behavior when an attacker gains control over a domain, such as executing remote code on the domain controller, using techniques such as DC Shadow, replicating the domain controller with malicious intent, data exfiltration, and suspicious group modifications.

Domain Dominance

Defender for Identity uses Lateral Movement Paths to help provide a visual on how an attacker could move within your organization and target valuable accounts.

Lateral Movement

Microsoft Defender for Identity is a tool that keeps a watchful eye on all the activity and data within your network. It can track user permissions and group membership to create a baseline for each user. By using adaptive technology, it is able to identify unusual activity, providing you with insights into potential security threats such as advanced attacks, user compromise, and insider threats.

Reconnaissance

Defender for Identity helps to minimize your company's vulnerability to attacks through the use of security reports and analysis of user profiles. This results in a smaller attack surface and makes it more difficult for attackers to access user information and carry out successful attacks.

Compromised Credential

New cards
66

When deploying Defender for Identity, a special AD DS account should be used so Defender for Identity can perform various functions, such as querying a domain controller for information on various events that have been discovered.

Which of the following should be created?

Group Managed Service Account (gMSA)

New cards
67

Microsoft Defender for Identity is a cloud-based security solution that protects identities and data within an organization by identifying, detecting, and investigating advanced threats by utilizing on-premise Active Directory sensors.

Defender for Identity is designed to detect potential threats across the entire cyber-attack kill chain.

Given the following description:

By using adaptive technology, it can identify unusual activity, providing insights into potential security threats such as advanced attacks, user compromise, and insider threats.

Which of the following threats matches the description?

Reconnaissance

New cards
68

What Microsoft cloud-based security solution includes Azure Active Directory, Windows Defender Advanced Threat Protection (ATP), and Microsoft Cloud App Security?

Microsoft Defender for Identity

New cards
69

Which of the following SIEM components is responsible for gathering all event logs from the configured devices and securely sending them to the SIEM system?

Collectors

New cards
70

Microsoft Sentinel is an enterprise cloud solution that utilizes SIEM and SOAR systems with Azure services and on-premise environments. Which of the following Sentinel features can integrate non-Microsoft solutions such as Syslog and Common Event Format (CEF) and third-party services such as Amazon Web Services and Google Workspaces?

Sentinel data connectors

New cards
71

Microsoft Sentinel is a cloud-based solution that provides which of the following? (Select two.)

Security orchestration, automation, and response (SOAR)

Security information and event management (SIEM)

New cards
72

Sentinel components include data connectors, log retention, workbooks, automation playbooks, analytic alerts, incident response, and threat investigation with artificial intelligence.

Which of the following describes Azure workbooks?

Helps you get an overall visualization of your data.

New cards
73

What must be done before Sentinel can begin to provide security analytics and threat intelligence and response throughout an enterprise?

Must be successfully added to a workspace.

New cards
74

You are the administrator for 122 Azure Windows virtual machines and 14 Azure Arc-enabled Windows servers. To ensure your server resources are secure, Microsoft Defender for Cloud uses the Azure Monitor Agent (AMA) to send information about the servers to Defender for Cloud.

Which of the following can be enabled to deploy the agent to your servers without disruption?

Defender for Server

New cards
75

Many attacks attempt to modify system files, critical data files, registry settings, and application software.

Which of the following is a Defender for Cloud feature that addresses these types of attacks?

File Integrity Monitoring (FIM)

New cards
76

Microsoft Defender for Cloud has features that help reduce the attack surface.

As the administrator for multiple locations, you occasionally need to access a virtual machine remotely.

Which of the following can you use to provide access to management ports without leaving these ports open all the time?

Use just-in-time (JIT) VM access.

New cards
77

As the administrator for 43 Azure virtual machines running Windows Server, you have onboarded all systems to Microsoft Defender for Cloud.

Microsoft Defender for Cloud utilizes a feature called workflow automation to provide alerts and recommendations.

During the process of adding a workflow automation in Azure, what can you configure that allows the grouping of workflows as logical units so they can be easily managed?

Logic App

New cards
78

Microsoft Defender for Cloud continually assesses resources for security issues and provides a secure score.

The secure score is part of the Security posture. To improve the secure score, Defender for Cloud makes recommendations on how to resolve security issues.

When viewing a recommendation, which of the following are provided as part of the recommendation? (Select four.)

Affected resources

Remediation steps

Description

Related recommendations

New cards
79

Which of the following BEST describes the role of an access control list within a Windows firewall?

Permits or denies network traffic through a firewall.

New cards
80

You use a Windows desktop system. You need to configure Windows Firewall to allow traffic for a newly installed application that dynamically opens multiple ports as-needed.

What should you do?

Add an exception for the application.

New cards
81

When should you disable the Windows firewall?

Only if the computer is protected by a different firewall program.

New cards
82

Which of the following predefined exceptions in Windows Firewall allow users to view and control remote desktops?

Remote Assistance

New cards
83

Which statements are true regarding firewalls? (Select two.)

Host-based firewalls are implemented using software and reside on the individual hosts within the network.

Network firewalls are typically implemented using hardware and positioned at the network's perimeter.

New cards
84

You have installed a new Windows system and have not changed the default configuration of the Windows Firewall.

How will the Windows Firewall handle inbound responses to requests sent from the local system?

All such traffic is allowed by default.

New cards
85

You have installed a new Windows 11 system and have not changed the default configuration of the Windows Firewall.

How will the Windows Firewall handle inbound traffic initiated from an external server that a hacker is using to spread a worm?

All such traffic is blocked by default.

New cards
86

Windows provides several interfaces that can be used to configure the Windows Defender Firewall.

Drag the Windows Firewall interface on the left to its appropriate description on the right. (Each tool may be used once, more than once, or not at all.)

Allows you to create rules based on ports.

Windows Defender Firewall with Advanced Security

Lets you add, change, or remove ports that are allowed through the firewall.

Allowed apps

Allows you to turn a firewall on or off for a specific profile or network.

Firewall & Network Protection

Allows you to create rules based on authentication.

Windows Defender Firewall with Advanced Security

The main interface and starting point for the other two interfaces.

Firewall & Network Protection

New cards
87

You have a Windows system with wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is used for public connections.

You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but you want to block any such access from the wireless network.

How can you configure Windows Firewall to allow and deny access as described?

Enable the Remote Assistance exception only on the private profile.

New cards
88

You need to change how Windows provides notifications when the firewall blocks a new program.

Click the links that you would choose to make this change. (Select two.)

Change notification settings

Turn Windows Defender Firewall on or off

New cards
89

You have a system that has BitLocker enabled. You run the cmdlet Get-BitLockerVolume with the appropriate options to retrieve information on the MountPoint for the system volume (C) and the data volume (D).

You determine that the data volume (D) does not unlock automatically when the server restarts.

What command or cmdlet should you run to ensure the data volume (D) will unlock automatically when the server starts?

manage-bde -autounlock -enable D:

New cards
90

Manage-bde is a command line tool that can administer BitLocker settings. Which of the following can be done using Manage-bde? (Select two.)

Configure recovery methods.

Encrypt and decrypt drives.

New cards
91

Encrypting File System (EFS) was added to the NTFS file system with the release of Windows 2000. EFS is exclusive to the Windows Operating System. EFS encrypts individual files and folders. Which of the following does EFS use for symmetric encryption?

File Encryption Key (FEK)

New cards
92

In an enterprise environment, which of the following tools is used to manage keys, automate encryption, and check compliance for BitLocker?

Microsoft BitLocker Administration and Monitoring (MBAM)

New cards
93

You are the administrator of an Active Directory network. Due to recent security concerns, it is now required to use Bitlocker to encrypt all volumes. You have several hundred servers and need to manage the BitLocker recovery keys.

Which of the following is the BEST option to store the recovery keys?

Active Directory

New cards
94

To decrypt any encrypted data, the encryption key is needed. The encryption key method is combined with different algorithms to encrypt the data fully. Which of the following are common methods of using encryption keys? (Select two.)

Asymmetric

Symmetric

New cards
95

You had a system that experienced a graphics card failure. You installed the graphics card, and the system would no longer boot. After checking, you discovered the operating system volume was encrypted with BitLocker.

Which of the following can be used to recover the system and boot to the encrypted system volume?

Use the BitLocker recovery key.

New cards
96

Which of the following can be used to access BitLocker encrypted data from a hard disk drive that has been critically damaged?

Repair-bde

New cards
97

Which of the following allows a Windows Server with TPM enabled and a pre-boot network connection to automatically unlock a BitLocker-encrypted operating system volume without user intervention?

Network Unlock

New cards
98

BitLocker is used to encrypt an entire volume, not just individual files and folders. Which of the following does BitLocker utilize for encryption? (Select two.)

Advanced Encryption Standard (AES)

Trusted Platform Module (TPM)

New cards
99

Once Azure Key Vault has been set up and configured, you can utilize Azure Disk Encryption to activate BitLocker on IaaS VMs. Which of the following does the server need access to?

Azure storage endpoint

New cards
100

You have deployed client-side encryption for your on-premises Windows servers. Where are encryption keys stored in client-side encryption?

Locally

New cards

Explore top notes

note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 25 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(2)

Explore top flashcards

flashcards Flashcard140 terms
studied byStudied by 6 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard27 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard75 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 3 people
Updated ... ago
4.7 Stars(3)
flashcards Flashcard91 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 27 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 23 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 49 people
Updated ... ago
5.0 Stars(1)