Unit 2 - Practice Quiz

CSC104

1 Which Windows component is responsible for storing local user account passwords in a hashed format?

A. NTDS.dit
B. SAM (Security Account Manager)
C. pagefile.sys
D. Winlogon.exe

2 In the context of Windows permissions, what happens when a user has Modify allow permissions via NTFS but Read allow permissions via the Network Share?

A. The user can modify files because NTFS takes precedence.
B. The user has Full Control.
C. The user can only Read files.
D. The user is denied access completely.

3 Which command-line tool is primarily used to display the current TCP/IP network configuration values, including the IP address and default gateway?

A. netstat
B. ipconfig
C. nslookup
D. tracert

4 What is the default TCP port number used by the Remote Desktop Protocol (RDP)?

A. 22
B. 443
C. 3389
D. 8080

5 Which Windows feature helps prevent unauthorized changes to the operating system by prompting the user for permission or an administrator password?

A. Windows Defender
B. User Account Control (UAC)
C. BitLocker
D. Windows Firewall

6 In the Windows Event Viewer, which specific log would record a successful or failed user logon attempt?

A. Application Log
B. System Log
C. Security Log
D. Setup Log

7 Which command is used to display the active TCP connections, ports on which the computer is listening, and Ethernet statistics?

A. netstat
B. ping
C. ipconfig
D. whoami

8 What symbol is appended to the end of a share name to make it a 'hidden' share in Windows?

A. #
B. !
C. $
D. %

9 Which protocol is primarily used by Windows for file and printer sharing across a local network?

A. HTTP
B. SMB (Server Message Block)
C. FTP
D. SMTP

10 What is the specific Windows Event ID associated with a successful logon?

A. 4624
B. 4625
C. 1102
D. 4672

11 Which Sysinternals tool allows a user to execute processes on other systems, often used for remote administration?

A. ProcMon
B. PsExec
C. TCPView
D. Autoruns

12 If a Windows client is configured for DHCP but cannot contact the DHCP server, it assigns itself an APIPA address in which range?

A.
B.
C.
D.

13 Which command-line tool outputs the current user's security identifiers (SIDs) and privileges?

A. whoami /all
B. net user
C. sysinfo
D. get-acl

14 Which Windows administrative tool allows for the centralized management of various system components using 'snap-ins'?

A. Task Manager
B. MMC (Microsoft Management Console)
C. Registry Editor
D. Control Panel

15 Which file system permission allows a user to take ownership of a file or folder?

A. Read
B. Write
C. Full Control
D. List Folder Contents

16 What is the primary function of the Domain Name System (DNS)?

A. Assigning IP addresses to clients
B. Resolving hostnames to IP addresses
C. Encrypting network traffic
D. Blocking malicious network packets

17 Which command is used to modify user accounts, such as adding a new user or changing a password, via the command line?

A. net user
B. net share
C. net use
D. net group

18 What is the name of the built-in antivirus and anti-malware component in modern Windows operating systems?

A. Windows Defender
B. Windows Firewall
C. BitLocker
D. SmartScreen

19 In the context of Windows Groups, which built-in group has complete and unrestricted access to the computer?

A. Power Users
B. Administrators
C. Backup Operators
D. Users

20 Which command allows you to view the list of currently running processes and their Process IDs (PIDs) in the command prompt?

A. tasklist
B. processview
C. ps
D. runlist

21 What does the command ipconfig /flushdns do?

A. Resets the IP address
B. Clears the DNS resolver cache
C. Renews the DHCP lease
D. Restarts the DNS server service

22 Which file path represents the default location for the local hosts file in Windows?

A. C:\Windows\System32\drivers\etc\hosts
B. C:\Windows\hosts
C. C:\Windows\System32\config\hosts
D. C:\Users\Default\hosts

23 Which Authentication protocol is the default for computers in an Active Directory domain and relies on tickets?

A. NTLM
B. Kerberos
C. RADIUS
D. LDAP

24 What is the executable name for the Windows Group Policy Editor?

A. regedit.exe
B. gpedit.msc
C. services.msc
D. secpol.msc

25 When configuring the Windows Firewall, what is the difference between Inbound and Outbound rules?

A. Inbound rules control traffic leaving the PC; Outbound rules control traffic entering.
B. Inbound rules apply to servers; Outbound rules apply to clients.
C. Inbound rules control traffic entering the PC; Outbound rules control traffic leaving.
D. There is no difference.

26 Which command allows you to map a network share to a local drive letter (e.g., Z:)?

A. net use
B. net share
C. net map
D. mount

27 What is the standard port number for SMB (Server Message Block) over TCP?

A. 135
B. 139
C. 445
D. 53

28 Which Windows service management console command is used to open the Services window?

A. taskmgr
B. services.msc
C. compmgmt.msc
D. eventvwr

29 In NTFS permissions, what is the effect of the 'Deny' permission?

A. It is overridden by an 'Allow' permission.
B. It takes precedence over 'Allow' permissions.
C. It only applies if no 'Allow' permission exists.
D. It only applies to the Guest account.

30 Which legacy Windows protocol allows applications on separate computers to communicate over a LAN and uses 15-character names?

A. DNS
B. NetBIOS
C. DHCP
D. Telnet

31 Which tool can be used to view programs that run automatically when Windows starts?

A. Event Viewer
B. Task Scheduler
C. Task Manager (Startup tab)
D. Disk Management

32 Which command is used to force a refresh of Group Policy settings on a client machine?

A. gpupdate /force
B. gpresult /r
C. net pol update
D. sysprep

33 What is a Security Identifier (SID) in Windows?

A. The user's login password.
B. A unique alphanumeric character string that identifies each user, group, and computer account.
C. The IP address of the domain controller.
D. The encryption key for the SAM database.

34 Which registry hive usually contains the Run keys that control startup programs for the local machine?

A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
B. HKEY_USERS\.DEFAULT
C. HKEY_CLASSES_ROOT
D. HKEY_CURRENT_CONFIG

35 What is the purpose of the Windows Audit Policy?

A. To compress old log files.
B. To determine which security events are recorded in the Event Logs.
C. To automatically block suspicious IP addresses.
D. To enforce password complexity rules.

36 Which command displays detailed configuration information about a computer and its operating system, including the OS version, install date, and hotfixes?

A. ver
B. systeminfo
C. hostname
D. whoami

37 If you need to investigate why a scheduled task failed to run, which tool would you check first?

A. Task Scheduler History/Logs
B. Device Manager
C. Windows Firewall Logs
D. Resource Monitor

38 What is the executable name for the Remote Desktop Connection client?

A. rdp.exe
B. mstsc.exe
C. remote.exe
D. connect.exe

39 Which type of user account is best practice for performing daily, non-administrative tasks?

A. Administrator Account
B. Standard User Account
C. Guest Account
D. System Account

40 In the output of netstat -ano, what does the -o switch display?

A. The owner of the process
B. The Process ID (PID)
C. The protocol used
D. The off-load state

41 Which folder permissions inheritance setting is the default behavior in NTFS?

A. Files do not inherit permissions.
B. Files inherit permissions from their parent folder.
C. Files inherit permissions from the root of the drive only.
D. Files inherit permissions from the user's profile.

42 What is the loopback IP address used to test the network interface on the local host?

A.
B.
C.
D.

43 Which Windows tool allows you to view and modify the registry?

A. regedit
B. msconfig
C. gpedit
D. dxdiag

44 Which command is used to display the routing table on a Windows machine?

A. route print
B. netstat -r
C. Both A and B
D. None of the above

45 What happens to the NTFS permissions of a file when it is moved to a different folder on the same volume?

A. It inherits the permissions of the new folder.
B. It retains its original permissions.
C. All permissions are removed.
D. It becomes read-only.

46 Which net command is used to list all the shares exported by the local computer?

A. net session
B. net view
C. net share
D. net export

47 Which protocol uses a 'Challenge-Response' mechanism and is considered less secure than Kerberos?

A. NTLM (New Technology LAN Manager)
B. SSH
C. TLS
D. IPsec

48 In the Windows Firewall, which profile typically applies when connected to a public Wi-Fi hotspot?

A. Domain Profile
B. Private Profile
C. Public Profile
D. Work Profile

49 Which administrative tool allows you to view hardware resources, update drivers, and disable hardware components?

A. Disk Management
B. Device Manager
C. Task Scheduler
D. ODBC Data Sources

50 What is the purpose of the ping command?

A. To transfer files between computers.
B. To test reachability of a host using ICMP Echo Request.
C. To find the path taken by packets.
D. To resolve a MAC address to an IP.