A technician would like to limit computer access to certain users. Which of the following should be configured?
A. Advanced security
B. Boot.ini file
C. System configuration
D. Local security policy
CompTIA exam questions
A technician would like to limit computer access to certain users. Which of the following should be configured?
A. Advanced security
B. Boot.ini file
C. System configuration
D. Local security policy
A technician needs to change the minimum password length to 8 characters to make it more secure. Which of the following system settings should the technician configure?
A. Windows Firewall
B. Windows Security Center
C. Local Security Policy
D. System Configuration
A company has created a personal SSL certificate for an internal website and a user is reporting error messages when accessing the site. In which of the following locations could a technician troubleshoot SSL certificate errors?
A. System Protection
B. Folder Options->View Hidden Files
C. Internet Options->Content
D. Local Security Policy
A technician is tasked with changing the account lockout threshold to 30 minutes in Windows 7. Which of the following should the technician use to accomplish this task?
A. User Access Control
B. Windows Security Center
C. Local Security Policy
D. Users and Groups
A technician is trying to setup a non-domain user account on a workstation, but receives the following error message “Password does not meet the complexity requirements.” Which of the following utilities should the technician use to identify the criteria?
A. Local Security Policy
B. Users and Groups
C. Performance Monitor
D. MSCONFIG
A technician has a computer locked in a cabinet in the office that shares a printer and some files. The computer must remain on. Which of the following Control Panel options would be used to control the users that are able to shut the computer down?
A. Power options
B. Security center
C. Local security policy
D. System
From which of the following tools can a technician locate the PID of an application?
A. Local Security Policy
B. MSCONFIG
C. Computer Management
D. Task Manager
A user, Jane, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?
A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.