SlideShare a Scribd company logo
1 of 2
Download to read offline
Kindly answer questions
Question 6: Microsoft uses the same method to record a user's file activity as (choose all that
apply):
Their encrypted passwords.
Apple does.
Their internet history using Microsoft Edge.
Their internet history using Chrome.
Their internet history using Internet Explorer.
Question 7: ShimCache tracks:
User logons.
File changes.
Time zone changes.
Compatibility issues with executed programs.
Changes made to installed programs.
Question 8:The relative identifier (RID) of 1003 identifies:
A user-created account.
A guest account.
A false account.
An unsupported account type.
An administrator account.
Question 9:The registry hive for the user profile contains (choose all that apply):
USER.DAT
HKEY Curent User.
The Recycle Bin.
The user's configuration settings.
The user's preferences.
Question 10: USB devices pose the following security risks (choose all that apply):
They are small.
They are portable.
They are high-capacity.
They may be used to exfiltrate data.
They may be used to introduce malware.
Their encrypted
passwords.
Apple does.
Their internet history using Microsoft Edge.
Their internet history using Chrome.
Their internet history using Internet Explorer.

More Related Content

Similar to Kindly answer questions Question 6- Microsoft uses the same method to.pdf

Microsoft Word Editing Version 1.0Software Requirement Speci.docx
Microsoft Word Editing  Version 1.0Software Requirement Speci.docxMicrosoft Word Editing  Version 1.0Software Requirement Speci.docx
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
jessiehampson
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
audeleypearl
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
Andrew Wong
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
LaticiaGrissomzz
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
ADEIJ Journal
 

Similar to Kindly answer questions Question 6- Microsoft uses the same method to.pdf (20)

Microsoft Word Editing Version 1.0Software Requirement Speci.docx
Microsoft Word Editing  Version 1.0Software Requirement Speci.docxMicrosoft Word Editing  Version 1.0Software Requirement Speci.docx
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
 
Kindly answer the questions Question 1- Each user profile has its own.pdf
Kindly answer the questions  Question 1- Each user profile has its own.pdfKindly answer the questions  Question 1- Each user profile has its own.pdf
Kindly answer the questions Question 1- Each user profile has its own.pdf
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Ch10
Ch10Ch10
Ch10
 
Ch10 system administration
Ch10 system administration Ch10 system administration
Ch10 system administration
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014
 
Whittaker How To Break Software Security - SoftTest Ireland
Whittaker How To Break Software Security - SoftTest IrelandWhittaker How To Break Software Security - SoftTest Ireland
Whittaker How To Break Software Security - SoftTest Ireland
 
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data LeakageOwasp Mobile Risk Series : M4 : Unintended Data Leakage
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
Michelle K Webster: Malware - Cryptolocker Research Final
Michelle K Webster:  Malware - Cryptolocker Research FinalMichelle K Webster:  Malware - Cryptolocker Research Final
Michelle K Webster: Malware - Cryptolocker Research Final
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
2 security concepts
2 security concepts2 security concepts
2 security concepts
 
Password management
Password managementPassword management
Password management
 
Android App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSecAndroid App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSec
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 

More from reachaakar

You can distinguish the various types of bonds by their terms of contr.pdf
You can distinguish the various types of bonds by their terms of contr.pdfYou can distinguish the various types of bonds by their terms of contr.pdf
You can distinguish the various types of bonds by their terms of contr.pdf
reachaakar
 

More from reachaakar (20)

Enter a SUMIFS function into cell B12 on the Contribution worksheet th.pdf
Enter a SUMIFS function into cell B12 on the Contribution worksheet th.pdfEnter a SUMIFS function into cell B12 on the Contribution worksheet th.pdf
Enter a SUMIFS function into cell B12 on the Contribution worksheet th.pdf
 
are clusters of unmyelinated cell bodies- are found only in the CNS- c.pdf
are clusters of unmyelinated cell bodies- are found only in the CNS- c.pdfare clusters of unmyelinated cell bodies- are found only in the CNS- c.pdf
are clusters of unmyelinated cell bodies- are found only in the CNS- c.pdf
 
Assuming Hadley sells 279 units at $13 each- what is the value of her.pdf
Assuming Hadley sells 279 units at $13 each- what is the value of her.pdfAssuming Hadley sells 279 units at $13 each- what is the value of her.pdf
Assuming Hadley sells 279 units at $13 each- what is the value of her.pdf
 
16- Let XPoisson() and YPoisson() and assume that X and Y are independ.pdf
16- Let XPoisson() and YPoisson() and assume that X and Y are independ.pdf16- Let XPoisson() and YPoisson() and assume that X and Y are independ.pdf
16- Let XPoisson() and YPoisson() and assume that X and Y are independ.pdf
 
1- What arguments should Liu Hong offer the company chairman in favor.pdf
1- What arguments should Liu Hong offer the company chairman in favor.pdf1- What arguments should Liu Hong offer the company chairman in favor.pdf
1- What arguments should Liu Hong offer the company chairman in favor.pdf
 
13- Determine the phenotype- Yellow body color is dominant to blue- rY.pdf
13- Determine the phenotype- Yellow body color is dominant to blue- rY.pdf13- Determine the phenotype- Yellow body color is dominant to blue- rY.pdf
13- Determine the phenotype- Yellow body color is dominant to blue- rY.pdf
 
1- Managers that leads a function that contributes directly to the pro.pdf
1- Managers that leads a function that contributes directly to the pro.pdf1- Managers that leads a function that contributes directly to the pro.pdf
1- Managers that leads a function that contributes directly to the pro.pdf
 
A DJ is preparing a playlist of 24 songs- How many different ways can.pdf
A DJ is preparing a playlist of 24 songs- How many different ways can.pdfA DJ is preparing a playlist of 24 songs- How many different ways can.pdf
A DJ is preparing a playlist of 24 songs- How many different ways can.pdf
 
You can distinguish the various types of bonds by their terms of contr.pdf
You can distinguish the various types of bonds by their terms of contr.pdfYou can distinguish the various types of bonds by their terms of contr.pdf
You can distinguish the various types of bonds by their terms of contr.pdf
 
While the accounting- management- marketing- economics and finance dep.pdf
While the accounting- management- marketing- economics and finance dep.pdfWhile the accounting- management- marketing- economics and finance dep.pdf
While the accounting- management- marketing- economics and finance dep.pdf
 
The random variable x is known to be uniformly distributed between 1-0.pdf
The random variable x is known to be uniformly distributed between 1-0.pdfThe random variable x is known to be uniformly distributed between 1-0.pdf
The random variable x is known to be uniformly distributed between 1-0.pdf
 
7- 8- This blue-colored metamorphic roek was found in Moreno Val.pdf
7-     8-   This blue-colored metamorphic roek was found in Moreno Val.pdf7-     8-   This blue-colored metamorphic roek was found in Moreno Val.pdf
7- 8- This blue-colored metamorphic roek was found in Moreno Val.pdf
 
Suppose the H and Z genes are on the same chromosome and 20 map units.pdf
Suppose the H and Z genes are on the same chromosome and 20 map units.pdfSuppose the H and Z genes are on the same chromosome and 20 map units.pdf
Suppose the H and Z genes are on the same chromosome and 20 map units.pdf
 
Table 1 -OLS using Criminality as the control variable of interest (us.pdf
Table 1 -OLS using Criminality as the control variable of interest (us.pdfTable 1 -OLS using Criminality as the control variable of interest (us.pdf
Table 1 -OLS using Criminality as the control variable of interest (us.pdf
 
The labor-force participation rate is the percentage of the- The labor.pdf
The labor-force participation rate is the percentage of the- The labor.pdfThe labor-force participation rate is the percentage of the- The labor.pdf
The labor-force participation rate is the percentage of the- The labor.pdf
 
The Digestive System 1- Explain the three phases of gastric activity-.pdf
The Digestive System 1- Explain the three phases of gastric activity-.pdfThe Digestive System 1- Explain the three phases of gastric activity-.pdf
The Digestive System 1- Explain the three phases of gastric activity-.pdf
 
The endosymbiotic theory was proposed because scientists observed many (1).pdf
The endosymbiotic theory was proposed because scientists observed many (1).pdfThe endosymbiotic theory was proposed because scientists observed many (1).pdf
The endosymbiotic theory was proposed because scientists observed many (1).pdf
 
Step 5- Create a Financiallnstrument object- and run print_data( )- Yo.pdf
Step 5- Create a Financiallnstrument object- and run print_data( )- Yo.pdfStep 5- Create a Financiallnstrument object- and run print_data( )- Yo.pdf
Step 5- Create a Financiallnstrument object- and run print_data( )- Yo.pdf
 
Required information Exercise 7-1 (Algo) Accounts receivable subsidiar (1).pdf
Required information Exercise 7-1 (Algo) Accounts receivable subsidiar (1).pdfRequired information Exercise 7-1 (Algo) Accounts receivable subsidiar (1).pdf
Required information Exercise 7-1 (Algo) Accounts receivable subsidiar (1).pdf
 
Question 1- Let (Yn-n0) be a sequence of i-i-d- random variables- all.pdf
Question 1- Let (Yn-n0) be a sequence of i-i-d- random variables- all.pdfQuestion 1- Let (Yn-n0) be a sequence of i-i-d- random variables- all.pdf
Question 1- Let (Yn-n0) be a sequence of i-i-d- random variables- all.pdf
 

Recently uploaded

Recently uploaded (20)

8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Scopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS PublicationsScopus Indexed Journals 2024 - ISCOPUS Publications
Scopus Indexed Journals 2024 - ISCOPUS Publications
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 

Kindly answer questions Question 6- Microsoft uses the same method to.pdf

  • 1. Kindly answer questions Question 6: Microsoft uses the same method to record a user's file activity as (choose all that apply): Their encrypted passwords. Apple does. Their internet history using Microsoft Edge. Their internet history using Chrome. Their internet history using Internet Explorer. Question 7: ShimCache tracks: User logons. File changes. Time zone changes. Compatibility issues with executed programs. Changes made to installed programs. Question 8:The relative identifier (RID) of 1003 identifies: A user-created account. A guest account. A false account. An unsupported account type. An administrator account. Question 9:The registry hive for the user profile contains (choose all that apply): USER.DAT HKEY Curent User. The Recycle Bin.
  • 2. The user's configuration settings. The user's preferences. Question 10: USB devices pose the following security risks (choose all that apply): They are small. They are portable. They are high-capacity. They may be used to exfiltrate data. They may be used to introduce malware. Their encrypted passwords. Apple does. Their internet history using Microsoft Edge. Their internet history using Chrome. Their internet history using Internet Explorer.