A+ 902 Test 16 Flashcards
Which of the following functionalities allows a DLP system to fulfil its role?
Content inspection
Which of the acronyms listed below refers to a security solution designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?
DLP
One of the measures for securing networking devices includes the practice of disabling unused ports.
True
Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
ACL
Digital security prevention methods include:
Antimalware
Email filtering
Directory permissions
Antivirus
What is the best countermeasure against social engineering?
User education
A set of rules enforced in a network that restricts the use to which the network may be put is known as:
AUP
A security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities is known as principle of least privilege.
True
Which of the following default local groups has the least amount of access privileges in MS Windows?
Guest
Which of the statements listed below are true?
NTFS permissions apply to both network and local users
NTFS permissions can be applied to a folder or individual file
Which of the following statements describing share permissions in MS Windows are true?
Apply only to network users
Can be set on a folder level
In NTFS filesystem, the term “Permission propagation” refers to a situation where a folder or file created inside another folder takes on (inherits) permissions applied to that folder (permissions applied to the so-called parent folder propagate down to its child objects, i.e. folders and files created inside that folder).
True
In NTFS filesystem, a folder or file copied from one location to another on the same volume retains its original permissions.
True
In NTFS filesystem, a folder or file moved from one location to another on the same volume inherits permissions of its new parent folder.
False
ATTRIB is a command used to set and remove file attributes in Microsoft Windows operating systems. Available options for this command include: read-only (R), archive (A), system (S), and hidden (H). With ATTRIB, the “+” symbol sets an attribute for a file, the “-“ sign removes the attribute. Which of the answers listed below refers to the correct syntax for applying the read-only attribute to a file?
ATTRIB +R [drive:] [path] [filename]
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is known as:
SSO
The “Run as administrator” option in MS Windows allows users with lower-level permissions to perform tasks reserved for system administrators. This feature requires providing Administrator account credentials and temporarily elevates the current user’s privileges to perform a given task. It also simplifies common system tasks, such as for example installation of new software, which would otherwise require logging out and switching to an admin account.
True
What is the name of a Microsoft Windows feature that allows for encrypting entire drives?
BitLocker
A Microsoft Windows feature specifically designed to enable encryption of removable drives is known as:
BitLocker To Go
Which of the answers listed below refers to a Windows built-in component that allows for encryption of individual files?
Encrypting File System (EFS)
Which of the following passwords is the most complex?
G$L3tU8wY@z
Which of the security settings in MS Windows determines the number of unique new passwords that have to be associated with a user account before an old password can be reused?
Password history setting
Which of the security policy settings in MS Windows prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?
Minimum password age setting
Which of the security policy settings listed below prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?
Maximum password age setting