2.5 Windows Security Flashcards

Given a scenario, manage and configure basic security settings in the Microsoft Windows OS

1
Q

Give the other name for local sign-in

A

Interactive login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is network authentication performed in network sign-in?

A

By using Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe how remote sign-in works

A

Allows users to access the local network by using a VPN or a webportal (SSL/TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What factor is username and password?

A

Knowledge-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is SSO more secure?

A

Because reducing the number of applications users are logging into reduces the number of attack surfaces. It also means passwords are never reused between accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Single sign-on

A

Users authenticate on the device or network to gain access to multiple apps or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the 5 registry hives

A

HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where should new users be placed when they are created?

A

Into the standard user group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which group is the first user on a system placed in by default?

A

Administrator group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Power user

A

More permissions than user but less than admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

UAC

A

Windows securitiy feature used to protect the system against malicious programs, scripts and attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does UAC work?

A

Giving the user opportunity to approve or deny any changes that require admin-level permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NTFS

A

Process used by Windows NT OS for efficient storage, organisation, and discovery of files on a hard disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are NTFS permissions assigned?

A

They are assigned to a file or folder by using a user’s account or group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which permissions take precedence?

A

Generally deny permissions take precedence over allow permissions
Permissions applied directly to an object take precedence over permissions inherited from a parent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If share permissions are used in NTFS, where will they be applied?

A

Locally and over the network

17
Q

Where are share permissions set?

A

At the root of the share and its subdirectories

18
Q

To what files and folders will the most restrictive permissions apply?

A

Files and folders that are accessed over the network

19
Q

Inheritance

A

Where all subfolders and files are applied the same permissions as the parent folder

20
Q
A