2.5 Windows Security Flashcards
Given a scenario, manage and configure basic security settings in the Microsoft Windows OS
Give the other name for local sign-in
Interactive login
How is network authentication performed in network sign-in?
By using Kerberos
Describe how remote sign-in works
Allows users to access the local network by using a VPN or a webportal (SSL/TLS)
What factor is username and password?
Knowledge-based
Why is SSO more secure?
Because reducing the number of applications users are logging into reduces the number of attack surfaces. It also means passwords are never reused between accounts
Single sign-on
Users authenticate on the device or network to gain access to multiple apps or services
List the 5 registry hives
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG
Where should new users be placed when they are created?
Into the standard user group
Which group is the first user on a system placed in by default?
Administrator group
Power user
More permissions than user but less than admin
UAC
Windows securitiy feature used to protect the system against malicious programs, scripts and attacks
How does UAC work?
Giving the user opportunity to approve or deny any changes that require admin-level permission
NTFS
Process used by Windows NT OS for efficient storage, organisation, and discovery of files on a hard disk
How are NTFS permissions assigned?
They are assigned to a file or folder by using a user’s account or group
Which permissions take precedence?
Generally deny permissions take precedence over allow permissions
Permissions applied directly to an object take precedence over permissions inherited from a parent