Module 2 Graded Quiz: Windows Security :Overview, Administration, and Security (IBM Cybersecurity Analyst Professional Certificate) Answers 2025
1. Question 1
Which of the following is the most suitable reason to recommend deactivating the guest account unless necessary?
-
✅ It is less secure due to its well-known system identifier (SID), which provides minimal permissions.
-
❌ It provides administrative privileges.
-
❌ It requires Kerberos authentication.
-
❌ It cannot be monitored or audited.
Explanation:
Guest accounts are risky because their SID is publicly known, making them an easy target for misuse.
2. Question 2
An organization wants to secure remote access to its network for work-from-home employees. Which authentication method should be implemented?
-
❌ Kerberos
-
❌ TACACS
-
❌ SSO
-
✅ RADIUS
Explanation:
RADIUS is the standard for secure remote authentication, commonly used with VPNs and remote workforce setups.
3. Question 3
What feature secures data on USB drives?
-
❌ Encrypting File System (EFS)
-
❌ BitLocker
-
✅ BitLocker to Go
-
❌ User Account Control (UAC)
Explanation:
BitLocker to Go is specifically designed for encrypting removable USB drives.
4. Question 4
When should you use NTFS permissions instead of share permissions?
-
❌ When setting permissions on a printer
-
✅ When setting permissions on individual files and folders within an NTFS-formatted partition
-
❌ When controlling access over the network to a shared folder
-
❌ When creating a shared folder on a FAT32 partition
Explanation:
NTFS permissions provide detailed control over files/folders locally, while share permissions apply only over networks.
5. Question 5
Computer is slow + unexpected pop-ups. Possible reason?
-
❌ Too many browser tabs
-
❌ Slow internet connection
-
❌ Hardware upgrade needed
-
✅ The computer may be infected with malware.
Explanation:
Sudden slowdown + pop-ups = classic symptoms of adware/malware infection.
6. Question 6
Best practice in patch management?
-
❌ Ignore critical patches
-
❌ Update software annually
-
❌ Apply patches without testing
-
✅ Create a rollback plan in case of issues
Explanation:
A rollback plan ensures systems can be restored safely if updates cause problems.
7. Question 7
How can admins manage updates for multiple PCs in a large organization?
-
❌ Disable updates
-
❌ Visit each computer
-
❌ Install updates only for management
-
✅ Use a WSUS server for centralized update distribution
Explanation:
WSUS centrally manages and deploys updates across many systems efficiently.
8. Question 8
Role of Kerberos Key Distribution Center (KDC)?
-
❌ Manages user credentials/permissions
-
❌ Standard database for profiles
-
✅ Initial point of contact for clients requesting access to services
-
❌ Encrypts messages
Explanation:
KDC authenticates users and issues tickets for accessing network services.
9. Question 9
First step in establishing an auditing policy?
-
✅ Identify critical assets
-
❌ Develop audit policy
-
❌ Implement audit policy
-
❌ Review
Explanation:
You must know what needs protection before designing an audit policy.
10. Question 10
Unknown caller claiming tech support asking for remote access. What should you do?
-
✅ Hang up and directly call your computer brand’s official tech support number.
-
❌ Fix problem based on their instructions
-
❌ Ask them to email details
-
❌ Grant access
Explanation:
This is a common social engineering scam. Never allow unknown remote access.
🧾 Summary Table
| Q No. | Correct Answer | Key Concept |
|---|---|---|
| 1 | Guest account insecure due to well-known SID | Security risk |
| 2 | RADIUS | Remote authentication |
| 3 | BitLocker to Go | USB encryption |
| 4 | NTFS permissions | File-level access control |
| 5 | Malware infection | System security |
| 6 | Create rollback plan | Patch management |
| 7 | WSUS | Centralized updates |
| 8 | KDC = first authentication point | Kerberos |
| 9 | Identify critical assets | Audit planning |
| 10 | Hang up & call official support | Social engineering safety |