Microsoft (MS-500) Exam Questions And Answers page 19
What are the security risks of running a "repair" installation for Windows XP?
Pressing Shift+F1gives the user administrative rights
Pressing Ctrl+F10 gives the user administrative rights
There are no security risks when running the "repair" installation for Windows XP
Monitor and troubleshoot Microsoft 365 security
What is the purpose of mactime in the coroner's toolkit?
Single Choice
What does mactime, an essential part of the coroner's toolkit do?
It traverses the file system and produces a listing of all files based on the modification, access and change timestamps
It can recover deleted file space and search it for data. However, it does not allow the investigator to preview them
The tools scans for i-node information, which is used by other tools in the tool kit
It is too specific to the MAC OS and forms a core component of the toolkit
Monitor and troubleshoot Microsoft 365 security
What does the 63.78.199.4(161) denotes in a Cisco router log?
Mar 14 22:57:53.425 EST: %SEC-6-IPACCESSLOGP: list internet-inbound denied udp 66.56.16.77(1029) -> 63.78.199.4(161), 1 packet
Mar 14 22:57:53.425 EST: %SEC-6-IPACCESSLOGP: list internet-inbound denied udp 66.56.16.77(1029) -> 63.78.199.4(161), 1 packet
Destination IP address
Source IP address
Login IP address
None of the above
Implement and manage threat protection
What does the acronym POST mean as it relates to a PC?
Primary Operations Short Test
PowerOn Self Test
Pre Operational Situation Test
Primary Operating System Test
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
What is the purpose of the superblock in Linux?
Single Choice
What does the superblock in Linux define?
filesynames
diskgeometr
location of the firstinode
available space
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
What do you call the process in which an attacker uses magnetic field over the digital media device to delete any previously stored data?
Disk deletion
Disk cleaning
Disk degaussing
Disk magnetization
Implement and manage threat protection
What feature of Decryption Collection allows an investigator to crack a password as quickly as possible?
Cracks every password in 10 minutes
Distribute processing over 16 or fewer computers
Support for Encrypted File System
Support for MD5 hash verification
Implement and manage threat protection
Implement and manage information protection
What feature of Windows is the following command trying to utilize?
White space
AFS
ADS
Slack file
Implement and manage identity and access
Monitor and troubleshoot Microsoft 365 security
What file is processed at the end of a Windows XP boot to initialize the logon dialog box?
NTOSKRNL.EXE
NTLDR
LSASS.EXE
NTDETECT.COM
Implement and manage identity and access
Manage governance and compliance features in Microsoft 365
What happens when a file is deleted by a Microsoft operating system using the FAT file system?
only the reference to the file is removed from the FAT
the file is erased and cannot be recovered
a copy of the file is stored and the original file is erased
the file is erased but can be recovered
Implement and manage information protection
Comments