Skip to content

Module 2 Graded Quiz: Windows Security :Overview, Administration, and Security (IBM Cybersecurity Analyst Professional Certificate) Answers 2025

1. Question 1

Which of the following is the most suitable reason to recommend deactivating the guest account unless necessary?

  • It is less secure due to its well-known system identifier (SID), which provides minimal permissions.

  • ❌ It provides administrative privileges.

  • ❌ It requires Kerberos authentication.

  • ❌ It cannot be monitored or audited.

Explanation:
Guest accounts are risky because their SID is publicly known, making them an easy target for misuse.


2. Question 2

An organization wants to secure remote access to its network for work-from-home employees. Which authentication method should be implemented?

  • ❌ Kerberos

  • ❌ TACACS

  • ❌ SSO

  • RADIUS

Explanation:
RADIUS is the standard for secure remote authentication, commonly used with VPNs and remote workforce setups.


3. Question 3

What feature secures data on USB drives?

  • ❌ Encrypting File System (EFS)

  • ❌ BitLocker

  • BitLocker to Go

  • ❌ User Account Control (UAC)

Explanation:
BitLocker to Go is specifically designed for encrypting removable USB drives.


4. Question 4

When should you use NTFS permissions instead of share permissions?

  • ❌ When setting permissions on a printer

  • When setting permissions on individual files and folders within an NTFS-formatted partition

  • ❌ When controlling access over the network to a shared folder

  • ❌ When creating a shared folder on a FAT32 partition

Explanation:
NTFS permissions provide detailed control over files/folders locally, while share permissions apply only over networks.


5. Question 5

Computer is slow + unexpected pop-ups. Possible reason?

  • ❌ Too many browser tabs

  • ❌ Slow internet connection

  • ❌ Hardware upgrade needed

  • The computer may be infected with malware.

Explanation:
Sudden slowdown + pop-ups = classic symptoms of adware/malware infection.


6. Question 6

Best practice in patch management?

  • ❌ Ignore critical patches

  • ❌ Update software annually

  • ❌ Apply patches without testing

  • Create a rollback plan in case of issues

Explanation:
A rollback plan ensures systems can be restored safely if updates cause problems.


7. Question 7

How can admins manage updates for multiple PCs in a large organization?

  • ❌ Disable updates

  • ❌ Visit each computer

  • ❌ Install updates only for management

  • Use a WSUS server for centralized update distribution

Explanation:
WSUS centrally manages and deploys updates across many systems efficiently.


8. Question 8

Role of Kerberos Key Distribution Center (KDC)?

  • ❌ Manages user credentials/permissions

  • ❌ Standard database for profiles

  • Initial point of contact for clients requesting access to services

  • ❌ Encrypts messages

Explanation:
KDC authenticates users and issues tickets for accessing network services.


9. Question 9

First step in establishing an auditing policy?

  • Identify critical assets

  • ❌ Develop audit policy

  • ❌ Implement audit policy

  • ❌ Review

Explanation:
You must know what needs protection before designing an audit policy.


10. Question 10

Unknown caller claiming tech support asking for remote access. What should you do?

  • Hang up and directly call your computer brand’s official tech support number.

  • ❌ Fix problem based on their instructions

  • ❌ Ask them to email details

  • ❌ Grant access

Explanation:
This is a common social engineering scam. Never allow unknown remote access.


🧾 Summary Table

Q No. Correct Answer Key Concept
1 Guest account insecure due to well-known SID Security risk
2 RADIUS Remote authentication
3 BitLocker to Go USB encryption
4 NTFS permissions File-level access control
5 Malware infection System security
6 Create rollback plan Patch management
7 WSUS Centralized updates
8 KDC = first authentication point Kerberos
9 Identify critical assets Audit planning
10 Hang up & call official support Social engineering safety