
How to prevent attackers from exploiting Windows privileges
Interactive Video
•
Architecture, Information Technology (IT), Other
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common method attackers use to gain initial access to a network?
By using physical USB drives
Through direct phone calls
Through social media
Via email phishing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to establish a baseline for Windows privileges?
To increase network speed
To improve user experience
To detect unusual activity
To reduce software costs
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a recommended method to control macro usage in an organization?
Encourage users to download macros from the internet
Allow all users to run macros
Use group policies to restrict macros
Disable all Microsoft Office applications
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Application Guard for Office used for?
To improve printing capabilities
To increase storage space
To isolate and examine risky documents
To enhance document formatting
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do attackers often disguise malicious documents in cloud-based phishing attacks?
As music files
As video files
As trusted cloud service documents
As system updates
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What percentage of office attacks involve weaponized documents?
75%
30%
45%
60%
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key reason attackers target cloud services in phishing campaigns?
To access free storage
To exploit user trust in cloud services
To reduce their own costs
To improve their own cloud services
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?