Chapter 8 Flashcards

1
Q

What is the main objective of implementing security controls in Microsoft Windows systems and networks?

A

To protect Microsoft Windows systems and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define network in the context of Microsoft Windows.

A

A collection of computers and devices joined by connection media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three main types of vulnerabilities that need attention for securing a Microsoft Windows network?

A
  • Physical and logical access
  • Traffic flow
  • Computer and device security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a Local Area Network (LAN) cover?

A

A small physical area, such as an office or building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Metropolitan Area Network (MAN)?

A

Connects two or more LANs but does not span an area larger than a city or town

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a Wide Area Network (WAN)?

A

To connect multiple LANs and WANs and span very large areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List some network security controls.

A
  • Access controls for protected resources
  • Communication controls
  • Anti-malware software
  • Recovery plans
  • Configuration management
  • Monitoring tools
  • Software patch management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Using firewalls is a method to control unauthorized traffic on a network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of connection media is most commonly used in networks?

A

Unshielded twisted pair (UTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main advantage of fiber-optic cable?

A

Immunity to radio and electrical interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: The protocol that enables secure communication over the web is _______.

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary function of a router in a network?

A

To connect two or more separate networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a network file server provide?

A

Secure access to stored data for remote users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of a firewall?

A

To filter network traffic to block suspicious packets or messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does NAT stand for, and what is its function?

A

Network address translation; it hides the true IP address of internal computers from outside nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the significance of the OSI Reference Model?

A

It describes how computers use multiple layers of protocol rules to communicate across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List some common network communication protocols.

A
  • Telnet
  • Secure Shell (SSH)
  • HTTPS
  • SSL/TLS
  • TCP/IP
  • IPSec
  • SSTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True or False: Telnet encrypts all information transmitted, making it secure.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the main purpose of service accounts in Windows?

A

To define rights and permissions based on user accounts

20
Q

What should be done to secure services in a Windows environment?

A

Disable or remove unnecessary services

21
Q

Fill in the blank: The most common protocol pair for internet communication is _______.

22
Q

What is the purpose of configuration management software in network security?

A

To control network device configuration changes

23
Q

What is the recommended practice for running each service in Windows?

A

Run each service as a user that possesses the minimum privileges necessary to perform the service’s functions.

24
Q

What should be done if a service is not needed?

A

Stop it, disable it, remove it.

25
What encryption methods should be used for securing wireless networking?
Use WPA, WPA2, or WPA3 encryption.
26
What is the principle of least privilege?
Grant minimal rights and permissions to users.
27
What should be required from users to protect workstations from unauthorized access?
Require unique user accounts with strong passwords for each user.
28
What should be done to user accounts after termination of employment?
Remove or disable unused user accounts.
29
What is the purpose of auditing failed access attempts?
To monitor and enhance security by tracking unauthorized access attempts.
30
What is a recommended action after five failed logon attempts?
Enable account lockout.
31
What should be done to protect workstations from malicious software?
Require all workstations to have anti-malware software installed and updated.
32
What should be done with outbound traffic to protect against DoS and DDoS attacks?
Configure each workstation’s firewall to filter outbound traffic.
33
What authentication method does Windows use by default?
Kerberos.
34
What should be enforced on each Windows server regarding malware protection?
Install antivirus and antispyware software.
35
What is the role of stand-alone firewalls in network security?
They process firewall rules and forward only approved traffic.
36
What should be included in a cloud service provider's service level agreement (SLA)?
Know what each one promises regarding security and recovery goals.
37
What does Microsoft Defender for Cloud allow?
Consistent assessments of your security posture and recommendations for action.
38
What is the purpose of configuring security alerts in Azure Resource Graph Explorer?
To create queries for alerting and monitoring governance.
39
What should be done to protect sensitive data at rest?
Use encryption.
40
What should be the approach for firewall rules?
Establish rules to deny all suspicious traffic.
41
Fill in the blank: The principle of least privilege helps to _______.
[grant minimal rights and permissions to users]
42
True or False: It is advisable to enable SSID broadcast for better network visibility.
False.
43
What should be done to guest access in a secure network?
Install a separate wireless access point for guests.
44
What should users be trained on to enhance workstation security?
How to create strong passwords and protect user account credentials.
45
What is one of the best practices for managing user accounts?
Establish unique domain user accounts.
46
What should be done to services running as a domain administrator user?
Do not allow any services to run as a domain administrator user.