Chapter 7 Flashcards
Study for Midterm
True or False? The Windows Subsystem for Linux (WSL) allows a GNU Linux environment to run in Windows without the use of a virtual machine.
True
True or False? As a general rule, the scope of a Windows audit is smaller than profiling a collection of computers.
False
The following are part of a Windows security audit, except:
* collecting configuration and performance information.
* recognizing and analyzing configuration or performance information changes.
* verifying that security policy complies with security controls.
* creating initial and subsequent baselines.
verifying that security policy complies with security controls.
True or False? The primary purpose of a Windows audit is to determine if a system has any malware.
False
True or False? When conducting a Windows audit, you compare the collected information with some standards or guidelines.
True
True or False? An audit is an evaluation of a collection of one or more objects.
True
The following statements are true regarding the Security Configuration and Analysis (SCA) tool, except:
* it uses security templates to store the settings that make up baselines.
* it does not allow the use of security templates acquired from some other source.
* it allows an administrator to analyze a computer and compare its configuration settings with a baseline.
* it can apply a baseline to force current computer settings to match the settings defined in the baseline.
- it does not allow the use of security templates acquired from some other source.
True or False? The Burp Suite scanner enables you to scan web servers for vulnerabilities that are specific to web applications.
True
True or False? Once a baseline template is created for profiling a Windows system, you can use the OpenVAS scanner to report differences between the current computer settings and the baseline.
True
What application provides an open source vulnerability scanner designed to scan web applications?
OpenVAS
What is a collection of security-related configuration settings on a computer?
Security baseline
Of the following Microsoft Windows security audit best practices, which one is the first logical step?
Creating baselines for each computer
Which of the following is true about the Security Configuration and Analysis (SCA) tool?
It applies a baseline to force current computer settings to match the settings defined in the baseline.
True or False? A best practice for Windows security audits is to enable Read or List auditing on all objects.
True
Which tool would be most favorable for assessing the security configuration on several Windows Server 2022 systems?
Microsoft Baseline Security Analyzer (MBSA)
In the lab, the OpenVAS scan of TargetWindows03 reported:
- three Medium Severity vulnerabilities.
- two Medium Severity vulnerabilities.
- four Medium Severity vulnerabilities.
- one Medium Severity vulnerability.
OpenVAS is licensed under the:
GNU General Public License
Policy Analyzer analyzes and compares groups of:
Group Policy Objects
OpenVAS is an open-source fork of which of the following?
Nessus
Policy Analyzer can help identify:
differences between GPOs or local registry settings
True or False? The Open Vulnerability Assessment System (OpenVAS) is an open source framework of a collection of tools and services.
True
Which of the following is an open source tool for scanning computers to identify vulnerabilities?
OpenVAS
True or False? You can conduct Windows profiling using either the Security Configuration and Analysis (SCA) MMC snap-in or the SCA command-line tool.
True
Which of the following is a text file used by Security Configuration and Analysis (SCA) that contains a list of configuration settings?
Security template