Managing windows security

Where can you find the group policy tool?
Active directory
1 of 17
What is group policy used for?
To control the working environment for domain connected computer and user accounts
2 of 17
What can settings on group policy be used for?
Restrict actions, secure the system or standardise a working environment
3 of 17
Name 4 settings in group policy?
Control registry, NTFS security, Software installation and folder redirection
4 of 17
What is encryption?
Converting data into an unreadable format
5 of 17
What is decryption?
Converting data back to clear text
6 of 17
What does encrypted file system do?
Encrypt files on an NTFS volume
7 of 17
What will happen to the file or folder once encrypted with EPS?
Turn green
8 of 17
On windows 10 what is added to the normal folder icon once encrypted with EPS?
Small lock icon
9 of 17
What does Bitlocker drive encryption do?
Encrypts the entire volume
10 of 17
What can bitlocker drive encryption use?
A computers TPM
11 of 17
Why must you keep your system up to date?
Protect your system from malware
12 of 17
When does Microsoft release security updates?
Second tuesday of every month
13 of 17
Which 2 ways can the server be hosted?
By Microsoft or by your organisation
14 of 17
What is the server called by Microsoft?
WSUS server
15 of 17
What are the 4 ways you can find updates on windows 10?
Windows update, WSUS, configuration manager or windows intune
16 of 17
Why is it important to keep mobile device operating systems and security applications up to date?
Mobile devices are a huge target from attacks and malware
17 of 17

Other cards in this set

Card 2

Front

What is group policy used for?

Back

To control the working environment for domain connected computer and user accounts

Card 3

Front

What can settings on group policy be used for?

Back

Preview of the front of card 3

Card 4

Front

Name 4 settings in group policy?

Back

Preview of the front of card 4

Card 5

Front

What is encryption?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar All resources:

See all All resources »See all IT resources »