2.7 - Given a scenario, implement security best practices to secure a workstation. Flashcards
1
Q
Password complexity and length.
A

2
Q
Password expiration and recovery.
A

3
Q
Desktop security.
A

4
Q
Password best practices.
A

5
Q
Restricting user permissions.
A

6
Q
Disabling unecessary accounts.
A

7
Q
Account lockout and disablement.
A

8
Q
Active Directory.
A

9
Q
Data encryption.
A

10
Q
Patch and update management.
A
