01 Flashcards

1
Q

_____________ is the process for targeted system or network information gathering. It involves active connections and directed queries of systems and networks in support of CNO initiatives

A

Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a Server vs workstation the core files and architectures are essentially the same T/F?

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _______ is optimized to provides application services and shared resources

A

Server OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ______ is optimized for interactive desktop response time

A

Workstation OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a ______, each system is considered standalone with regards to authentication and system security principles

A

Workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a _______ each system shares common configurations, resources, and security principles. A centralized data base known as ___________, maintains this information. Once set-up the server becomes a ______________

A

Domain
Active Directory
domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Domain servers running server OS’s without a active directory is called?

A

member servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

member servers maintain their own local SAM T/F?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Each ________ is a collection of information used by the system for determining access and privileges

A

User Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___________ are unique accounts that provide the account identifier information for services

A

Service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___________ are used to provide the account identifier for all processes executed on behalf of the user.

A

User Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is each part of a SID component?

S-1-5-21-776561741-162531612-682003330-500

A

S: Indictates its a SID
1: Revision level/ version number
5: authority value (windows)
long ass number: system or domain identifier rng
500: RID, individual for every account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Accounts/Account Types for each of these SIDS?

S-1-5-18
S-1-5-19
S-1-5-20
S-1-5-[4a]-500
S-1-5-[4a]-501

A

local system, service account
local service, service account
network service, service account
administrator, user account
guest, user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What makes up a Access token?

A

User SID
Group SID
Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Together, the access token and the _____________ form the primary ______________

A

object’s permissions, security context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When bob is logged in he is the administrator group and is using the admin token all the time T/F?

A

F

17
Q

A ________ is the ability of an account to perform a particular system related system operation such as shutting down the system, backing up/restoring files, changing system time, taking ownership of a file

A

privilege

18
Q

The ____________ establishes privileges and account rights for users,

A

local security policy

19
Q

What is considered privileges?

Allow logon locally
Allow logon over the network
Allow backup and restore
Allow Shutdown
Allow logon as a service
Allow system time to be changed

A

Allow backup and restore
Allow Shutdown
Allow system time to be changed

20
Q

__________ contains information that deals with logon abilities. However, account rights differ from privileges in that they are not included as part of the access token T/F?

A

Account rights
T

21
Q

Which of these are considered account rights?

Allow logon locally
Allow logon over the network
Allow backup and restore
Allow Shutdown
Allow logon as a service
Allow system time to be changed

A

Allow logon locally
Allow logon over the network
Allow logon as a service