17-A Flashcards

1
Q

What are common security controls that should be installed and configured on each workstation?

A
  • Antivirus
  • Firewall
  • Encryption
  • Account policies

These controls help protect systems against unauthorized access and malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a key requirement for effective user security?

A

Strong credential management

This includes implementing best practices for passwords and account policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the minimum password length recommended for ordinary user accounts?

A

12+ characters

Longer passwords are recommended for administrative accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What types of information should not be used in passwords?

A
  • Significant dates
  • Family names
  • Usernames
  • Job titles
  • Company names
  • Pet names
  • Quotations
  • Song lyrics

Any personal information that a threat actor could guess or discover should be avoided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: Password complexity requirements are always recommended for security.

A

False

Some standards bodies have deprecated complexity requirements due to their potential to encourage poor password practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a system user password configured in BIOS or UEFI?

A

Required before any operating system can boot

This password adds an extra layer of security for standalone computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a lunchtime attack?

A

Accessing a computer that has been left unlocked

Users should always log off or lock their computers when not in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should users do to protect critical hardware like laptops?

A
  • Use cable locks
  • Keep devices in sight in public

Physical theft is a significant risk for portable computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What principle should account management policies follow?

A

Least privilege

This means assigning the minimum necessary rights and privileges to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of file permissions in an operating system?

A

Control whether a user can read or modify a data file or folder

Configuring file permissions is the responsibility of the data owner or administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should be done with the default administrator account after OS installation?

A

Change the default password

The new password should be kept secure and known by one person only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of disabling the guest account?

A

To prevent unauthenticated access to the computer

The Guest account is disabled by default in current versions of Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What tools can be used to configure account policies on a standalone workstation?

A
  • Local Security Policy snap-in (secpol.msc)
  • Group Policy Editor snap-in (gpedit.msc)

These tools are not available in the Home edition of Windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the failed attempts lockout policy do?

A

Disables an account after a maximum number of incorrect sign-in attempts

This mitigates the risk of unauthorized access through brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is execution control in the context of workstation security?

A

Logical security technologies designed to prevent malicious software from running

Execution control does not solely rely on user behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the role of digital certificates in application security?

A

To perform code signing and prove authenticity and integrity of an installer package

This helps prevent the installation of unapproved software.

17
Q

What is the purpose of Windows Defender Antivirus?

A

Detect malware and prevent it from executing

It uses a database of known virus patterns and heuristic identification techniques.

18
Q

What types of updates are necessary for antivirus software?

A
  • Definition/pattern updates
  • Scan engine/component updates

Regular updates are critical for maintaining effective malware protection.

19
Q

What happens to Windows Defender Antivirus when a third-party antivirus product is installed?

A

It is replaced by the third-party product

The third-party software can also be disabled via group policy.

20
Q

What is the function of Windows Defender Firewall?

A

Filters inbound and outbound network traffic

It helps protect against unauthorized network access.

21
Q

What does the Advanced Firewall allow you to configure?

A
  • Custom inbound and outbound filtering rules
  • Default policies for traffic
  • Block or allow actions for specific ports, applications, and addresses

This level of control enhances network security.

22
Q

What is the difference between Block and Allow policies in Windows Defender Firewall?

A
  • Block: Stops traffic unless a specific rule allows it
  • Allow: Accepts all traffic unless a specific rule blocks it

These policies help manage network access effectively.

23
Q

What is the purpose of Windows Defender Firewall?

A

To control inbound and outbound traffic based on specified rules.

The firewall can be turned on or off, and users can switch the default policy for traffic between Block and Allow.

24
Q

What does the Block policy in Windows Defender Firewall do?

A

Stops traffic unless a specific rule allows it.

This is the opposite of the Allow policy, which accepts all traffic unless a specific rule blocks it.

25
What is the Encrypting File System (EFS)?
A feature of NTFS that supports file and folder encryption. ## Footnote EFS is not available in the Home edition of Windows.
26
How can data-at-rest be protected?
By applying encryption to individual files or folders. ## Footnote Data-at-rest refers to information stored on persistent storage devices.
27
What happens when a file is encrypted using EFS?
The file cannot be opened by other users, even administrators. ## Footnote Users receive an 'Access Denied' error when trying to access encrypted files they do not own.
28
What is the risk associated with losing a user's encryption key?
Data loss if the key is lost or damaged. ## Footnote This can occur due to profile damage, password resets, or Windows reinstallation.
29
What is Windows BitLocker?
A full disk encryption product available in all editions of Windows except the Home edition. ## Footnote BitLocker encrypts the entire drive, including swap files and temporary files.
30
What is a Trusted Platform Module (TPM)?
A chip that can securely store encryption keys and ensure the integrity of the OS. ## Footnote TPM ties the use of a fixed disk to a specific motherboard.
31
What should be done with the recovery key generated during BitLocker setup?
Store it on removable media or write it down and keep it securely. ## Footnote This key is essential for recovering an encrypted drive if the startup key is lost.
32
True or False: An organization should rely on automatic screen savers to prevent lunchtime attacks.
False. ## Footnote Organizations should implement multiple layers of security rather than relying solely on screen savers.
33
What type of account management policy can protect against password-guessing attacks?
Implementing account lockout policies. ## Footnote This policy limits the number of failed login attempts before an account is locked.
34
What checks should monitoring of antivirus software perform?
Check for updates, scan logs, and detection reports. ## Footnote Regular monitoring helps ensure that antivirus software is functioning effectively.
35
Fill in the blank: To protect workstation security, you should enable _______.
Windows Update, Windows Defender Antivirus, and Windows Defender Firewall. ## Footnote These features are essential for maintaining security against threats.
36
What are best practices for password management?
Use strong, unique passwords and change them regularly. ## Footnote Implementing password policies can help mitigate unauthorized access risks.
37
What should be done to the default administrator's user account?
Change the default administrator’s user account/password. ## Footnote This reduces the risk of unauthorized access to administrative functions.
38
What is the purpose of disabling AutoRun/AutoPlay?
To prevent unauthorized execution of programs from external media. ## Footnote This is a key security measure to avoid malware infections.