domingo, 8 de junio de 2014

02 | Malware Resistance - What’s New in Windows 8.1 Security - MVA - Microsoft Virtual Academy - Módulo 2 de 4



Nota:
  • La solución de las siguientes preguntas pueden ayudarte a aprobar el módulo, siempre y cuando sean las mismas que me mostraron.
  • Dos asteriscos (**) significa Alternativa Correcta.
  • Alternativas sin marcar significa que me equivoque en la respuesta, por consiguiente depende únicamente de tu conocimiento. Si logras identificar la alternativa correcta compártela en este Sitio Web y si te tocan nuevas preguntas también. Gracias!

02 | Malware Resistance

1. True or False: In Windows 8.1, Secure Boot maintains databases of trusted certificates and revoked certificates. 

**Verdadero
Falso


2.During the Secure Boot process, which of the following is used to attest that the operating system came from Microsoft and has not been tampered with since it was installed?  

A discrete TPM chip
TPM firmware
A signed OSLoader
Early launch anti-malware


3.True or False: In Windows 8.1, the Secure Boot process directly ensures that the Windows kernel is trusted.

Verdadero
**Falso


4.Which of the following verfies third-party drivers when they launch on a Windows 8.1 system? 
    
UEFI
OSLoader
**Early launch anti-malware
Remote attestation


5. Which of the following uses a cloud-based service for third-party verification of information written to the TPM chip during a Measured Boot process?
    
Early launch anti-malware
UEFI
**Remote attestation
TPM


Otros

1. During the Windows 8.1 boot process, the Windows kernel is verified by which of the following?
    
UEFI
OSLoader
Early launch anti-malware
BIOS


2. True or False: Windows 8.1 Secure Boot is a feature which cannot be turned off. 

Verdadero
**Falso


3. In Windows 8.1, which of the following facilitates the Secure Boot process?
    
Early launch anti-malware
BIOS
**UEFI
DMA


4. Which of the following are specific goals of Windows 8.1 malware protection? (Choose all that apply.)
         
To drive down the possibility that root kits/bootkits can take effect
To unify security between the operating system and hardware
To extend the hardware-based root of trust to distributed systems
b and c


5. True or False:  Information written to the TPM chip during the Measured Boot process is modifiable.

Verdadero
**Falso


6. Which of the following help to unify security between the operating system and hardware? (Choose two.)
         
**UEFI (Según el aporte de Anónimo)
DMA
**TPM (Según el aporte de Anónimo)
BIOS


7. Historically, which of the following has provided for communication between the operating system and hardware? 
    
TPM
BIOS
DMA
OSLoader


8. True or False: Non-Windows boot loaders can take advantage of Secure Boot on Windows 8.1 devices.

**Verdadero
Falso


9. In Windows 8.1, which of the following occurs during a Measured Boot process?
    
The firmware writes information to the TPM chip
Windows registers information in the TPM chip
The entire boot process is logged to a file which is signed by the TPM
**All of the above (Según el aporte de Anónimo)


Fuente: "Roberto Cocozza"  






4 comentarios:

  1. Which of the following help to unify security between the operating system and hardware? (Choose two.)

    **UEFI
    DMA
    **TPM
    BIOS

    ResponderEliminar
    Respuestas
    1. Hi Anonymous, thanks for the visit and the contribution of your knowledge !!
      I will quote the answer in the question ...
      Best wishes! Until any time !!

      Eliminar
  2. 9. In Windows 8.1, which of the following occurs during a Measured Boot process?

    The firmware writes information to the TPM chip
    Windows registers information in the TPM chip
    The entire boot process is logged to a file which is signed by the TPM
    ** All of the above

    ResponderEliminar
    Respuestas
    1. Hi Anonymous, thanks for the visit and the contribution of your knowledge !!
      I will quote the answer in the question ...
      Best wishes! Until any time !!

      Eliminar