Question Analysis

A Windows user’s registry was altered via a command-line tool to disable the lock workstation feature by adding a DWORD entry under the current user Policies\System key. Which registry value name was modified in this operation?

3dacb0d2-46ee-4c27-ac1b-f9886bf91a56
Question ID
4/16
Models Correct
1
Valid Answer
25%
Success Rate
Reference Answer

Human-validated correct answer for this question

DisableLockWorkstation
Model Performance Comparison

See how different AI models performed on this question

ModelAnswerKQL QueryStatusAttemptsTimeCost
gemini-2.5-flash-preview-04-17
No answer provided
No query generated
Incorrect
5
0.00s
0.0258
gpt-35-turbo
No answer provided
No query generated
Incorrect
5
0.00s
0.0113
gpt-4-turbo-2024-04-09
PromptOnSecureDesktop
DeviceRegistryEvents | where ActionType == 'RegistryValueSet' | where RegistryKey has 'Policies\\System' and (InitiatingProcessCommandLine has 'cmd.exe' or InitiatingProcessCommandLine has 'powershell.exe') | project DeviceName, InitiatingProcessAccountName, RegistryKey, RegistryValueName, InitiatingProcessCommandLine, TimeGenerated
Incorrect
4
36.59s
0.2441
gpt-4.1
DisableLockWorkstation
DeviceRegistryEvents | where RegistryKey endswith @"\Software\Microsoft\Windows\CurrentVersion\Policies\System" or RegistryKey endswith @"\Policies\System" | where (tolower(RegistryValueName) == "disablelockworkstation") and tolower(RegistryValueType) == "dword" | project TimeGenerated, DeviceName, RegistryKey, RegistryValueName, RegistryValueType, RegistryValueData, InitiatingProcessFileName, InitiatingProcessCommandLine
Correct
1
10.54s
0.0121
gpt-4.1-finetuned
DisableLockWorkstation
DeviceRegistryEvents | where RegistryKey has "CurrentVersion\\Policies\\System" | summarize by RegistryValueName
Correct
4
28.72s
0.0311
gpt-4.1-mini
No answer provided
No query generated
Incorrect
5
0.00s
0.0052
gpt-4.1-nano
No answer provided
No query generated
Incorrect
5
0.00s
0.0015
gpt-4o
No answer provided
No query generated
Incorrect
5
0.00s
0.0522
grok-3-beta
No answer provided
No query generated
Incorrect
5
0.00s
0.0876
grok-3-mini-beta
ModifiedValues
DeviceRegistryEvents | where RegistryKey contains 'HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\Windows\\System' | where RegistryValueType == 'REG_DWORD' | where ActionType == 'RegistryValueSet' | distinct RegistryValueName | summarize ModifiedValues = make_set(RegistryValueName)
Incorrect
3
43.67s
0.0047
o1-high
No answer provided
No query generated
Incorrect
5
0.00s
0.7382
o1-low
No answer provided
No query generated
Incorrect
5
0.00s
0.7519
o3-mini-high
No answer provided
No query generated
Incorrect
5
0.00s
0.0324
o3-mini-low
DisableLockWorkstation
DeviceRegistryEvents | where RegistryKey has "Policies\\System" | where RegistryValueType has "DWORD" | where isnotempty(InitiatingProcessCommandLine) | distinct RegistryValueName
Correct
1
21.69s
0.0100
o4-mini-high
DisableLockWorkstation
DeviceRegistryEvents | where ActionType == "RegistryValueSet" // Only DWORD-type value changes | where RegistryValueType has "DWORD" // Target the current user Policies\System key (where DisableLockWorkstation is stored) | where RegistryKey has @"\Software\Microsoft\Windows\CurrentVersion\Policies\System" // Detect use of reg.exe (reg add) for the modification | where InitiatingProcessFileName has_cs "reg.exe" or InitiatingProcessCommandLine has_cs "reg add" // Return the registry value name and related context | project TimeGenerated, DeviceName, InitiatingProcessAccountName, InitiatingProcessCommandLine, RegistryKey, RegistryValueName, RegistryValueData | order by TimeGenerated desc
Correct
2
101.59s
0.0241
o4-mini-low
No answer provided
No query generated
Incorrect
5
0.00s
0.0390