2.2 Flashcards

1
Q

What is a centralized database that allows a system admin to manage all of the systems and users from one location?

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When a user that is on the Active Directory logs in, what is responsible for mapping network drives, updating security signatures, and updating application software?

A

Login script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What feature is included in Active Directory that allows the sys admin to define specific policies for a group of users?

A

Group Policy/Updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are a system admin that wants to set a log-in restriction and password complexity requirement to a group of users. Where would this be done?

A

Group Policy management in Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Organizational Units?

A

It is the Active Directories’ representation of the company’s user structure (locations, departments, hierarchy, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do we use Home Folder for?

A

Assign a network share that allows the user easy access to store their information in a centralized place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is folder redirection?

A

It is what allows a user to store their information to the centralized server rather than their local computer, which in return will allow them to access their files from anywhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Mobile Device Management?

A

It is the centralized management of mobile devices that are used for work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of a Mobile Device Management user restriction?

A

Camera app won’t work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does port security prevent?

A

Someone from unplugging a device from a switch and plugging in their own device instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is port security based off of?

A

source MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain how port security works.

A

Switch expects a specific number of mac addresses to interact with. When the number is exceeded, port security activates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain how MAC filtering works.

A

You are able to limit access to your network by only allowing specific MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an example of a certificate-based authenticator?

A

Smart card (CAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: Windows Defender Firewall is an example of a _____ _____ _____.

A

Host-based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What two ways can network-based firewalls filter traffic?

A

Port number

Applications

17
Q

Explain Directory permissions.

A

Allows the owner of a file to lock down the access to that file in order to prevent accidental viewing, modification, or deletion.

18
Q

What is Data Loss Prevention?

A

The ability to stop data leakage by monitoring the traffic that is being transferred throughout the internet.

19
Q

What is the principle of “Least Privilege”?

A

Rights and permissions should be set to the bare minimum for each user.