14-C Flashcards
What do logical access controls ensure?
Each user is identified and authenticated before being allowed to use a host or network services.
What is a security control?
A safeguard or prevention method to avoid, counteract, or minimize risks relating to personal or company property.
Name the three types of security controls.
- Physical controls
- Procedural controls
- Logical controls
What are physical controls?
Controls that work in the built environment to control access to sites. Examples include fences, doors, and locks.
What are procedural controls?
Controls applied and enforced by people. Examples include incident response processes, management oversight, and security awareness training programs.
What are logical controls?
Controls applied and enforced by digital or cyber systems and software. Examples include user authentication, antivirus software, and firewalls.
What does the AAA triad stand for?
- Authentication
- Authorization
- Accounting
Define authentication in the context of access control.
The process of identifying an account and ensuring that it can only be operated by someone who can supply the correct credentials.
What is authorization?
Access to resources is allowed only to accounts with defined permissions.
What does accounting refer to in an access control system?
Logging when and by whom a resource was accessed.
What is a permission in security settings?
A security setting that determines the level of access an account has to a particular resource.
What is an access control list (ACL)?
A list attached to each resource that specifies the permissions for each subject.
What does implicit deny mean?
Unless there is a rule specifying that access should be granted, any request for access is denied.
What is the principle of least privilege?
A user should be granted the minimum possible rights necessary to perform their job.
What is a local account in Windows?
An account defined on a specific computer only, stored in the Security Account Manager (SAM).
What is a Microsoft account?
An account managed via an online portal, identified by an email address, and can synchronize profile settings between devices.
What is a security group?
A collection of user accounts used to assign permissions and rights more efficiently.
What is the primary function of the Administrators group?
Members have very high access to all files and system tasks.
What happens when the Guest user account is enabled?
It allows file sharing without passwords but is disabled by default.
What does User Account Control (UAC) do?
Protects the system against malicious scripts and requires user consent for performing privileged tasks.
What is multifactor authentication (MFA)?
A security process that requires the user to provide at least two different kinds of credentials.
What is 2-step verification?
A method where a soft token is generated and sent to a registered method to verify a sign-in request.
What is an authenticator application?
An application that can be used for passwordless access or as a two-factor authentication mechanism.
What is hard token authentication?
Authentication using a physical device like a smart card or USB drive to transmit credentials.
What are the three Windows authentication scenarios?
- Windows local sign-in
- Windows network sign-in
- Remote sign-in
What is Windows Hello?
A subsystem allowing the user to authenticate using alternative methods, such as a PIN or biometric recognition.
What is required to set up Windows Hello?
A PIN must be configured
The PIN acts as a backup mechanism if other methods become unavailable.
What does fingerprint authentication use to verify identity?
A sensor to scan the unique features of the user’s fingerprint
How does facial recognition work in Windows Hello?
Uses a webcam to scan the user’s face and records a 3-D image with infrared (IR) sensor
What is a security key in the context of Windows Hello?
A removable USB token or smart card, or a trusted smartphone with an NFC sensor
What does Single Sign-On (SSO) allow users to do?
Authenticate once to gain access to multiple applications or services
What are the advantages of Single Sign-On (SSO)?
Users do not manage multiple digital identities and passwords
What is a disadvantage of Single Sign-On (SSO)?
Compromising one account compromises multiple services
What does Windows Hello for Business aim to achieve?
Transition to passwordless SSO
What is the role of the Domain Controller (DC) in a Windows domain?
Stores Active Directory and provides authentication services
What is an Organizational Unit (OU) in Active Directory?
A way of dividing a domain into different administrative realms
What is the purpose of Group Policy in a domain?
Configures computer settings and user profile settings
What command is used to apply new or changed policies to a computer immediately?
gpupdate
What does the gpresult command do?
Displays the Resultant Set of Policies (RSoP) for a computer and user account
What is Mobile Device Management (MDM)?
Software to apply security policies to mobile devices in the enterprise
Fill in the blank: A _______ is a server-based system joined to the domain that does not maintain a copy of the Active Directory database.
member server
True or False: A local account can be used to access multiple computers.
False
What happens when a user attempts to access a network with an unregistered device?
Access is denied based on administrator-set parameters
What are the three principal user security groups created when Windows is installed?
- Administrators
- Users
- Guests
What tool is used to add a user to a local security group?
Computer Management
What is the function of a login script?
Performs configuration or process activity when the user signs in
What is the main function of Active Directory?
To manage user, group, and computer objects in a network
True or False: Group Policy Objects (GPOs) can be linked to multiple OUs.
True
What is the purpose of security groups in Active Directory?
To assign permissions more easily and robustly
What is the significance of the TPM in Windows Hello?
Stores the private key securely within the user device