17-A Flashcards
What are common security controls that should be installed and configured on each workstation?
- Antivirus
- Firewall
- Encryption
- Account policies
These controls help protect systems against unauthorized access and malware.
What is a key requirement for effective user security?
Strong credential management
This includes implementing best practices for passwords and account policies.
What is the minimum password length recommended for ordinary user accounts?
12+ characters
Longer passwords are recommended for administrative accounts.
What types of information should not be used in passwords?
- Significant dates
- Family names
- Usernames
- Job titles
- Company names
- Pet names
- Quotations
- Song lyrics
Any personal information that a threat actor could guess or discover should be avoided.
True or False: Password complexity requirements are always recommended for security.
False
Some standards bodies have deprecated complexity requirements due to their potential to encourage poor password practices.
What is the purpose of a system user password configured in BIOS or UEFI?
Required before any operating system can boot
This password adds an extra layer of security for standalone computers.
What is a lunchtime attack?
Accessing a computer that has been left unlocked
Users should always log off or lock their computers when not in use.
What should users do to protect critical hardware like laptops?
- Use cable locks
- Keep devices in sight in public
Physical theft is a significant risk for portable computers.
What principle should account management policies follow?
Least privilege
This means assigning the minimum necessary rights and privileges to users.
What is the role of file permissions in an operating system?
Control whether a user can read or modify a data file or folder
Configuring file permissions is the responsibility of the data owner or administrator.
What should be done with the default administrator account after OS installation?
Change the default password
The new password should be kept secure and known by one person only.
What is the purpose of disabling the guest account?
To prevent unauthenticated access to the computer
The Guest account is disabled by default in current versions of Windows.
What tools can be used to configure account policies on a standalone workstation?
- Local Security Policy snap-in (secpol.msc)
- Group Policy Editor snap-in (gpedit.msc)
These tools are not available in the Home edition of Windows.
What does the failed attempts lockout policy do?
Disables an account after a maximum number of incorrect sign-in attempts
This mitigates the risk of unauthorized access through brute force attacks.
What is execution control in the context of workstation security?
Logical security technologies designed to prevent malicious software from running
Execution control does not solely rely on user behavior.
What is the role of digital certificates in application security?
To perform code signing and prove authenticity and integrity of an installer package
This helps prevent the installation of unapproved software.
What is the purpose of Windows Defender Antivirus?
Detect malware and prevent it from executing
It uses a database of known virus patterns and heuristic identification techniques.
What types of updates are necessary for antivirus software?
- Definition/pattern updates
- Scan engine/component updates
Regular updates are critical for maintaining effective malware protection.
What happens to Windows Defender Antivirus when a third-party antivirus product is installed?
It is replaced by the third-party product
The third-party software can also be disabled via group policy.
What is the function of Windows Defender Firewall?
Filters inbound and outbound network traffic
It helps protect against unauthorized network access.
What does the Advanced Firewall allow you to configure?
- Custom inbound and outbound filtering rules
- Default policies for traffic
- Block or allow actions for specific ports, applications, and addresses
This level of control enhances network security.
What is the difference between Block and Allow policies in Windows Defender Firewall?
- Block: Stops traffic unless a specific rule allows it
- Allow: Accepts all traffic unless a specific rule blocks it
These policies help manage network access effectively.
What is the purpose of Windows Defender Firewall?
To control inbound and outbound traffic based on specified rules.
The firewall can be turned on or off, and users can switch the default policy for traffic between Block and Allow.
What does the Block policy in Windows Defender Firewall do?
Stops traffic unless a specific rule allows it.
This is the opposite of the Allow policy, which accepts all traffic unless a specific rule blocks it.