Chapter 3 Flashcards

(32 cards)

1
Q

True or False? In Windows, members of the IIS_IUSRS group may create and modify most types of accounts and can log in locally to domain controllers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False? In the Windows operating system environment, all users, groups, and computers have unique security identifiers (SIDs).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Kevin defining when he uses security policy to detail what tasks the organization’s users can perform on their computers?

A

User rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should Oscar do as a first step to prevent contractors from viewing each other’s project files?

A

Enable an expression-based security audit policy to track contractors’ access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following stores all user and computer Kerberos master keys?

A

Key distribution center (KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False? Windows Event Viewer enables auditing of event records.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Microsoft assign to distinguish objects that may originate from different computers?

A

Globally unique identifier (GUID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which principle describes the best balance between providing necessary access for authorized subjects and denying unnecessary access?

A

The principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which command-line tool, first introduced with Windows 2000, is used to display or modify access control lists for files and folders?

A

Cacls.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following describes a collection of features used to describe user and data attributes?
* Security Access Token (SAT)
* Effective permissions
* Dynamic Access Control (DAC)
* Rights Management Services (RMS)

A

Dynamic Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False? Dynamic Access Control (DAC) can help a user identify and classify data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False? Providing just the necessary access required to carry out a task is called the principle of least privilege.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False? Each entry in a discretionary access control list (DACL) is called an access control entry (ACE).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False? The token that Windows uses to store security identifiers (SIDs) is called the Security Access Token (SAT).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False? In Windows, the Security Access Token (SAT) contains Windows Registry information.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An access control strategy that gives a user or group of users only those powers that are absolutely essential to do the job required is called the:

A

Principle of least privilege

17
Q

Which access control permission enables you to change the content of a file once it is saved?

18
Q

In Windows, ________control access to network resources, such as servers or printers.
* NTFS permissions
* folder-level permissions
* privileged permissions
* share permissions**

A

Share permissions

19
Q

Which icacls.exe command would allow members of the Managers group to modify, read, and execute files in the C:\LabDocuments\MGRfiles folder?
* icacls C:\LabDocuments\MGRfiles /set Managers:(M, RX)
* icacls C:\LabDocuments\MGRfiles /set Managers:(M, RE)
* icacls C:\LabDocuments\MGRfiles /grant Managers:(M, RE)
* icacls C:\LabDocuments\MGRfiles /grant Managers:(M, RX)

A

icacls C:\LabDocuments\MGRfiles /grant Managers:(M, RX)

20
Q

In the icacls.exe help file (icacls.txt), which symbol would grant no access to the file or folder?

21
Q

True or False? In Windows, the Security Access Token (SAT) is specific to a folder.

22
Q

Which feature do systems administrators need to manage account passwords automatically at the domain level?
* Universally unique identifiers (UUIDs)
* Kerberos keys
* Discretionary access control lists (DACLs)
* Managed service accounts

A

Managed service accounts

23
Q

True or False? In the context of access control, security controls must provide object access for all authorized subjects.

24
Q

True or False? A security identifier (SID) identifies a security subject or group of subjects.

25
True or False? Microsoft refers to user accounts defined using the principle of least privilege as Administrators.
False
26
Which Windows Server security feature includes automatic Rights Management Services (RMS) for encrypting sensitive documents? * Dynamic Access Control (DAC) * Discretionary access control list (DACL) * File Classification Infrastructure (FCI) * User Account Control (UAC)
Dynamic Access Control (DAC)
27
In Windows, which group has a two-piece, or split, Security Access Token (SAT)?
Administrators
28
Which default Active Directory security group in Windows Server has unrestricted access to the computer or domain?
Administrators
29
Which term describes what a user can do to an object on a computer? * Rights * Permissions * Authentication * Access control
Permissions
30
True or False? In Windows, auditing is the process of collecting performance information on actions taken and storing that information for later analysis.
True
31
In the icacls.exe help file (icacls.txt), which symbol would grant modify access to the file or folder?
M
32
Security practitioners help to create policies and controls that enforce a layered defense, referred to as: * user control. * defense control. * defense in depth. * essential defense.
Defense in depth