Chapter 7 Flashcards

Study for Midterm

1
Q

True or False? The Windows Subsystem for Linux (WSL) allows a GNU Linux environment to run in Windows without the use of a virtual machine.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False? As a general rule, the scope of a Windows audit is smaller than profiling a collection of computers.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The following are part of a Windows security audit, except:
* collecting configuration and performance information.
* recognizing and analyzing configuration or performance information changes.
* verifying that security policy complies with security controls.
* creating initial and subsequent baselines.

A

verifying that security policy complies with security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False? The primary purpose of a Windows audit is to determine if a system has any malware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False? When conducting a Windows audit, you compare the collected information with some standards or guidelines.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False? An audit is an evaluation of a collection of one or more objects.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The following statements are true regarding the Security Configuration and Analysis (SCA) tool, except:
* it uses security templates to store the settings that make up baselines.
* it does not allow the use of security templates acquired from some other source.
* it allows an administrator to analyze a computer and compare its configuration settings with a baseline.
* it can apply a baseline to force current computer settings to match the settings defined in the baseline.

A
  • it does not allow the use of security templates acquired from some other source.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False? The Burp Suite scanner enables you to scan web servers for vulnerabilities that are specific to web applications.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False? Once a baseline template is created for profiling a Windows system, you can use the OpenVAS scanner to report differences between the current computer settings and the baseline.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What application provides an open source vulnerability scanner designed to scan web applications?

A

OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a collection of security-related configuration settings on a computer?

A

Security baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Of the following Microsoft Windows security audit best practices, which one is the first logical step?

A

Creating baselines for each computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is true about the Security Configuration and Analysis (SCA) tool?

A

It applies a baseline to force current computer settings to match the settings defined in the baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False? A best practice for Windows security audits is to enable Read or List auditing on all objects.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which tool would be most favorable for assessing the security configuration on several Windows Server 2022 systems?

A

Microsoft Baseline Security Analyzer (MBSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the lab, the OpenVAS scan of TargetWindows03 reported:

A
  • three Medium Severity vulnerabilities.
  • two Medium Severity vulnerabilities.
  • four Medium Severity vulnerabilities.
  • one Medium Severity vulnerability.
17
Q

OpenVAS is licensed under the:

A

GNU General Public License

18
Q

Policy Analyzer analyzes and compares groups of:

A

Group Policy Objects

19
Q

OpenVAS is an open-source fork of which of the following?

20
Q

Policy Analyzer can help identify:

A

differences between GPOs or local registry settings

21
Q

True or False? The Open Vulnerability Assessment System (OpenVAS) is an open source framework of a collection of tools and services.

22
Q

Which of the following is an open source tool for scanning computers to identify vulnerabilities?

23
Q

True or False? You can conduct Windows profiling using either the Security Configuration and Analysis (SCA) MMC snap-in or the SCA command-line tool.

24
Q

Which of the following is a text file used by Security Configuration and Analysis (SCA) that contains a list of configuration settings?

A

Security template

25
True or False? In Windows, a security analysis is also called 'profiling a system.'
True
26
True or False? An effective use of a computer's security baseline is to compare it to a known 'good' baseline.
True
27
True or False? A security audit in a Windows computer environment is a collection of configuration and performance information compared with information contained in the organization's security policy.
True
28
True or False? Regarding Windows auditing, collecting initial and subsequent baseline information usually includes audit log files to track access to sensitive resources.
True
29
Which SomarSoft tool dumps Windows dumps permissions and audit settings for the file system, Registry, and printers to text files?
DumpSec
30
Security baselines are:
groups of recommended configuration settings.