3A Flashcards
___ are critical as a form of Cyber Security for they protect computer systems and networks on one side of the ___ from outside systems on the other side.
Firewalls
Firewalls accomplish this by monitoring data packets passing through the firewall, and either allows the traffic through or blocks it. Administrators ___ ___ ___ the firewalls operate from.
set the rules
Firewalls can be implemented as hardware, software, or ___.
both
A good firewall system will not only block unauthorized users from accessing the internal network but can also block ___ ___ from a “need to know” about the mission or resources of the secure
network.
internal users
What does GPO stand for?
Group Policy Object
Windows OSs, through ___ ___, can be configured by network administrators to change which Windows features are available to users and to manage system security.
group policies
Group policy can be configured on a local computer system or centrally configured for the network through ___ ___ via Windows Server.
Active Directory
Active Directory settings will apply to systems and users every ___ ___, on next logon, and on restart.
90 minutes
A ___ of group policy configurations is called a group
policy object (GPO).
set
What are the three types of GPO?
- User settings
- Computer settings
- Security settings/local policies
The following describes which type of GPO?
___ ___ apply to a machine no matter who is logged in. These policies are used to restrict desktop settings.
User settings
What are the policies that fall under “user settings”?
- Windows Settings | Scripts User Settings Identification- This policy configures scripts that execute when a user logs on or off.
- Windows Settings | Internet Explorer Maintenance- This policy is used to configure settings in Internet Explorer (IE) such as website favorites and default home page.
- Administrative Templates | Control Panel- This policy enables or disables Windows Control Panel features to control what users can change in the system.
- Administrative Templates | Desktop- This policy controls what desktop icons appear on the system.
- Administrative Templates | Start Menu and Taskbar- This policy controls what items appear in the Start menu.
The following describes which type of GPO?
___ ___ enforce password policies and restrict software that can be used on a system.
Computer settings
What are the policies that fall under “computer settings”?
- Windows Settings | Scripts (Startup/Shutdown)- This implements scripts to allow automated processes to run during system startup or shutdown.
- Security Settings | Account Policies- This policy configures user accounts, for example, account lockout and password policies.
The following describes which type of GPO?
___ ___ contain user right configuration options, auditing, and other security settings including banners.
Security settings/local policies
What are the policies that fall under “security settings/local policies”?
- Security Settings | Windows Firewall with Advanced Security- This policy configures the firewall built into Windows.
- Security Settings | Software Restriction Policies- This policy configures what software is allowed to run on a system.
- Security Settings | Advanced Audit Policy Configuration- This policy controls the system auditing process and sets what types of events to audit.
A ___ server is a type of firewall that resides between a user’s computer and the Internet.
proxy
Proxies are typically associated with being able to control ____ communication by limiting which web sites an employee can visit.
outbound
Users will typically authenticate to the proxy server first, and based on their ____, the proxy administrator will decide whether the employee is allowed to use the Internet and which websites they can visit.
username
Proxy servers also ____ which websites are visited each day.
log
Proxy servers provide…?
security, privacy and web filtering
Also, proxies protect clients because at no point does the client directly connect to the website. If an attacker wants to attack the IP address that connected to the site, they will attack the ____
instead of the client.
proxy
Additionally, proxy servers can implement _____, which stores web pages that are requested by the client. The next client that requests the same web page can retrieve the page more quickly because the proxy server can provide the web page without retrieving if from the Internet
caching
A ____ proxy is what was previously described—the client sends the request to the proxy server and the proxy retrieves the resource out on the Internet and sends the response to the client.
forward