14-C Flashcards

1
Q

What do logical access controls ensure?

A

Each user is identified and authenticated before being allowed to use a host or network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a security control?

A

A safeguard or prevention method to avoid, counteract, or minimize risks relating to personal or company property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the three types of security controls.

A
  • Physical controls
  • Procedural controls
  • Logical controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are physical controls?

A

Controls that work in the built environment to control access to sites. Examples include fences, doors, and locks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are procedural controls?

A

Controls applied and enforced by people. Examples include incident response processes, management oversight, and security awareness training programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are logical controls?

A

Controls applied and enforced by digital or cyber systems and software. Examples include user authentication, antivirus software, and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the AAA triad stand for?

A
  • Authentication
  • Authorization
  • Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define authentication in the context of access control.

A

The process of identifying an account and ensuring that it can only be operated by someone who can supply the correct credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is authorization?

A

Access to resources is allowed only to accounts with defined permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does accounting refer to in an access control system?

A

Logging when and by whom a resource was accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a permission in security settings?

A

A security setting that determines the level of access an account has to a particular resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an access control list (ACL)?

A

A list attached to each resource that specifies the permissions for each subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does implicit deny mean?

A

Unless there is a rule specifying that access should be granted, any request for access is denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the principle of least privilege?

A

A user should be granted the minimum possible rights necessary to perform their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a local account in Windows?

A

An account defined on a specific computer only, stored in the Security Account Manager (SAM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Microsoft account?

A

An account managed via an online portal, identified by an email address, and can synchronize profile settings between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a security group?

A

A collection of user accounts used to assign permissions and rights more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary function of the Administrators group?

A

Members have very high access to all files and system tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens when the Guest user account is enabled?

A

It allows file sharing without passwords but is disabled by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does User Account Control (UAC) do?

A

Protects the system against malicious scripts and requires user consent for performing privileged tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is multifactor authentication (MFA)?

A

A security process that requires the user to provide at least two different kinds of credentials.

22
Q

What is 2-step verification?

A

A method where a soft token is generated and sent to a registered method to verify a sign-in request.

23
Q

What is an authenticator application?

A

An application that can be used for passwordless access or as a two-factor authentication mechanism.

24
Q

What is hard token authentication?

A

Authentication using a physical device like a smart card or USB drive to transmit credentials.

25
Q

What are the three Windows authentication scenarios?

A
  • Windows local sign-in
  • Windows network sign-in
  • Remote sign-in
26
Q

What is Windows Hello?

A

A subsystem allowing the user to authenticate using alternative methods, such as a PIN or biometric recognition.

27
Q

What is required to set up Windows Hello?

A

A PIN must be configured

The PIN acts as a backup mechanism if other methods become unavailable.

28
Q

What does fingerprint authentication use to verify identity?

A

A sensor to scan the unique features of the user’s fingerprint

29
Q

How does facial recognition work in Windows Hello?

A

Uses a webcam to scan the user’s face and records a 3-D image with infrared (IR) sensor

30
Q

What is a security key in the context of Windows Hello?

A

A removable USB token or smart card, or a trusted smartphone with an NFC sensor

31
Q

What does Single Sign-On (SSO) allow users to do?

A

Authenticate once to gain access to multiple applications or services

32
Q

What are the advantages of Single Sign-On (SSO)?

A

Users do not manage multiple digital identities and passwords

33
Q

What is a disadvantage of Single Sign-On (SSO)?

A

Compromising one account compromises multiple services

34
Q

What does Windows Hello for Business aim to achieve?

A

Transition to passwordless SSO

35
Q

What is the role of the Domain Controller (DC) in a Windows domain?

A

Stores Active Directory and provides authentication services

36
Q

What is an Organizational Unit (OU) in Active Directory?

A

A way of dividing a domain into different administrative realms

37
Q

What is the purpose of Group Policy in a domain?

A

Configures computer settings and user profile settings

38
Q

What command is used to apply new or changed policies to a computer immediately?

39
Q

What does the gpresult command do?

A

Displays the Resultant Set of Policies (RSoP) for a computer and user account

40
Q

What is Mobile Device Management (MDM)?

A

Software to apply security policies to mobile devices in the enterprise

41
Q

Fill in the blank: A _______ is a server-based system joined to the domain that does not maintain a copy of the Active Directory database.

A

member server

42
Q

True or False: A local account can be used to access multiple computers.

43
Q

What happens when a user attempts to access a network with an unregistered device?

A

Access is denied based on administrator-set parameters

44
Q

What are the three principal user security groups created when Windows is installed?

A
  • Administrators
  • Users
  • Guests
45
Q

What tool is used to add a user to a local security group?

A

Computer Management

46
Q

What is the function of a login script?

A

Performs configuration or process activity when the user signs in

47
Q

What is the main function of Active Directory?

A

To manage user, group, and computer objects in a network

48
Q

True or False: Group Policy Objects (GPOs) can be linked to multiple OUs.

49
Q

What is the purpose of security groups in Active Directory?

A

To assign permissions more easily and robustly

50
Q

What is the significance of the TPM in Windows Hello?

A

Stores the private key securely within the user device