Chapter 9 Flashcards

1
Q

What is the primary learning objective for Microsoft Windows Network Security?

A

Implement security controls to protect Microsoft Windows systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main types of vulnerabilities to secure in a Microsoft Windows network?

A
  • Physical and logical access
  • Traffic flow
  • Computer and device security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define a Local Area Network (LAN).

A

A LAN covers a small physical area, such as an office or building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a Metropolitan Area Network (MAN) connect?

A

Two or more LANs but does not span an area larger than a city or town.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of a Wide Area Network (WAN)?

A

Connect multiple LANs and WANs and span very large areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the types of network security controls.

A
  • Access controls for protected resources
  • Communication controls
  • Anti-malware software
  • Recovery plans
  • Configuration management software
  • Monitoring tools
  • Software patch management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: A collection of computers and devices joined by connection media is called a _______.

A

[network]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function of a firewall in network security?

A

Filters network traffic to block suspicious packets or messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of a router in a network?

A

Connects two or more separate networks and inspects address portions of packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: A switch can help avoid collision and congestion issues in networks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of cable is the most common for network connections?

A

Unshielded twisted pair (UTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Network File Server?

A

A computer or hardware device that provides secure access to its stored data for remote users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the advantages of using an application server?

A
  • Software does not need to be installed on every user’s computer
  • Easier software updates
  • Faster response time due to proximity to database servers
  • More data stays inside the organization’s secure network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: The protocol that allows encrypted remote system administration is called _______.

A

[Secure Shell (SSH)]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is IPSec used for?

A

To secure IP communication by encrypting each IP packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the term ‘Demilitarized Zone (DMZ)’ refer to in network security?

A

An untrusted network with servers accessible to unauthorized users without compromising the trusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List at least two common wired network connection types.

A
  • Shielded twisted pair (STP)
  • Fiber optic cable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the maximum transmission speed of the 802.11ac wireless protocol?

A

1.3 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: Telnet is considered a secure protocol for remote administration.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What should be done before enabling any service in a secure environment?

A

Develop a plan for keeping the service up to date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the main purpose of a network print server?

A

To provide the interface between computers and printers connected to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fill in the blank: Services should run as a user with the _______ necessary to perform their functions.

A

[minimum privileges]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does a gateway do in a network?

A

Connects two or more separate networks using different protocols.

24
Q

What are the layers defined in the OSI Reference Model?

A

Multiple layers of protocol rules for communication across a network.

25
What is the primary role of configuration management software?
To control network device configuration changes.
26
What does the term 'connection media' refer to?
The physical means used to connect computers and devices in a network.
27
What is the potential risk of a computer without proper security controls?
It poses a threat to the entire network.
28
What user account does Windows run every program as?
A specific user.
29
By default, many services in Windows run as what type of account?
A local admin account.
30
What is a potential risk if an attacker compromises a service?
The attacker could assume the identity of the user running the service.
31
What should you do to secure a Windows service?
Run each service as a user that possesses the minimum privileges necessary.
32
What is the best way to secure a specific service?
Disable or even remove it.
33
What should be done if a service is not needed?
* Stop it. * Disable it. * Remove it.
34
What encryption methods should be used for securing Windows wireless networking?
* WPA * WPA2 * WPA3
35
What is a recommended practice to limit outside eavesdropping on wireless networks?
Disable service set identifier (SSID) broadcast.
36
What is the principle of least privilege?
Grant minimal rights and permissions to users.
37
What should be done to protect workstations from unauthorized access?
* Train users on strong passwords. * Require unique user accounts. * Audit failed access attempts.
38
What happens after five failed logon attempts?
Account lockout should be enabled.
39
What should be done immediately after termination of employment?
Remove user access.
40
What type of software should all workstations have installed?
Anti-malware software.
41
How often should workstations be proactively scanned for malware?
At least weekly.
42
What does outbound traffic filtering help protect against?
Denial of service (DoS) and distributed denial of service (DDoS) attacks.
43
What authentication method does Windows use by default?
Kerberos.
44
What should be carefully examined for unnecessary services?
Each server’s role.
45
What should be updated frequently on Windows servers?
Antivirus and antispyware software.
46
What do stand-alone firewalls do?
Process firewall rules and forward only approved traffic.
47
What is a disadvantage of stand-alone firewalls?
Additional administrative workload.
48
What is a key feature of IPv6 in relation to IPv4?
End-to-end encryption using IPSec.
49
What should you ensure your cloud service provider supports?
The level of anti-malware required in your internal network.
50
What is the purpose of Microsoft Defender for Cloud?
Provides a security score from consistent assessments.
51
What does Azure Access Control IAM provide?
Another level of access control to cloud properties.
52
What should be set for compliance across an environment in Microsoft Defender for Cloud?
A security policy.
53
What should you do to protect sensitive data at rest?
Use encryption.
54
What should be enforced for user accounts?
Strong passwords.
55
What should be done about suspicious traffic?
Establish firewall rules and deny it.
56
What should be done with unused services?
Disable or uninstall them.
57
What is a best practice regarding public networks?
Avoid connecting to them.