1102: Chap 7 - Security Flashcards
1102-Chap7-12: You are configuring a router for a small office network. The network users should be able to access regular and secure websites and send and receive email. Those are the only connections allowed to the Internet. Which security feature should you configure to prevent additional traffic from coming through the router?
MAC filtering
Content filtering
Port forwarding/mapping
Port security/disabling unused ports
Port security/disabling unused ports
1102-Chap7-13: On a Win10 workstation, there are two NTFS volumes. The Managers group has Modify access to the D:\mgmt directory. You move the folder to the D:\keyfiles folder, to which the Managers group has Read Access. What level of permissions will the Managers group have to the new D:\keyfiles\mgmt directory?
Full Control
Modify
Read & Execute
Read
Modify
When you move or copy a folder on the same NTFS volume, it will keep its original permissions. If you copy it or move it to a different volume, it will inherit permissions from its new parent directory
1102-Chap7-19: What does NTFS use to track users and groupd and their level of access to resources?
ACLs
Token
Badges
Control rosters
ACLs
1102-Chap7-20: You have created a user account for a contract employee on a Windows 11 PC. The contractor will be with the company for a month. Which user group should this user’s account be placed in?
Power Users
Administrators
Standard Users
Guests
Guests
Guest have same access rights as Users, except: cannot access log files; Great for temporary workers
1102-Chap7-25: What wireless protocol used in WPA compensates for the weak encryption of WEP?
VLAN
TKIP
VPN
AES
TKIP
Temporal Key Integrity Protocol
WPA Encryption protocol
TKIP - temporal Key Integrity Protocol
WPA2 Encryption protocol
AES - Advanced Encryption Standard
1102-Chap7-30: What concept in Active Directory creates a directory subdivison within which may be placed users, groups, computers and other objects?
User
Domain
Organizational Unit
Home folder
Organizational Unit (OU)
Folder Redirection
AD feature to allow users to log in from other computers. I think it used to be called Windows roaming profiles
1102-Chap7-40: A user on your network reported that they received a phone call from someone in the IT department saying the user needed to reset their password. The caller offered to do it for them if they user could provide the IT worker with their current password. What is this most likely am example of?
The IT department helping the user to reset their password
A spoofing attack
A social engineering attack
A brute-force attack
A social engineering attack
1102-Chap7-42: Several employees at your company have been tailgating to gian access to secure areas. Which of the following security methods is the best choice for stopping this practice?
Door lock
Entry control roster
Access control vestibule
ID Badges
Access control vestibule
1102-Chap7-45: An administrator is transfering confidential files from one Windows Pro workstation to another, using a flash drive. Policy dictates that the files on the flash drive must be encrypted. What technology should be used?
BitLocker
BitLocker To Go
EFS
AES
BitLocker To Go
1102-Chap7-49: Several Workstations on your network have not had their operating systems updated in more than a year, and your anti-virus software is also out of date. What type of security threat does this represent?
Non-compliant system
Zombie/botnet
Brute-force attack
Zero-day attack
Non-compliant system
1102-Chap7-51: UserA is a member of the Dev group and the HR Group. They are trying to access a local resource on an NTFS volume. The HR group has Full Control permission for the payroll folder, and the Dev group has Deny Read permission for the same folder. What is UserA’s effective access to the payroll folder?
Full Control
Read
Write
Deny
Deny
When granting conflicting NTFS permissions, they are generally combined, and the most liberal is granted. The exception is when there is an explicit Deny. That overrides any allowed permissions
1102-Chap7-53: You have assigned a Windows workstation to a workgroup. Which of the following are recommended best practices for maxmizing security rehgarding the Administrator account? (Choose two)
Disable the Administrator account
Rename the Administrator account
Remove the Administrator account from the Administrators group
Require a strong password
Rename the Administrator account
Require a strong password