Core 2: Logical Security Flashcards
A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network is known as:
HomeGroup
Active Directory
Workgroup
Windows domain
Active Directory
On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.
MDM policy
Login script
Group Policy
Directory permissions
Login script
Which of the following terms describes a large network of Windows-based PCs under single administration?
HomeGroup
Windows domain
Active Directory
Workgroup
Windows domain
In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.
Local Users and Groups
Resource Monitor
Group Policy
User Account Control (UAC)
Group Policy
Windows Active Directory service allows for grouping users and computers into containers known as Organizational Units (OUs). An OU is the smallest unit to which system administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within a given OU.
True
False
True
In Windows domain environment, the term “Home Folder” refers to a directory on a local PC where users can back up their data and files.
True
False
False
Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user’s PC to a server-based location?
Folder redirection
Local Users and Groups
User Account Control (UAC)
Directory permissions
Folder redirection
Which of the following is an example of a soft token?
USB token
Authenticator app
Smart card
Key fob
Authenticator app
Which type of software enables a centralized administration of mobile devices?
MFA
MMC
MDM
MFD
MDM
What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network?
MAC address filtering
Network Address Translation (NAT)
Static IP addressing
Network Access Control (NAC)
MAC address filtering
Which of the following answers refers to an example implementation of certificate-based authentication?
Smart card
ID badge
PIN code
Biometric lock
Smart card
Virus definition database files contain detection patterns for known viruses. To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature.
True
False
True
An antivirus database entry used for identifying malicious code is known as virus:
ID
Record
Signature
Repository
Signature
An antivirus software is kept up to date via: (Select 2 answers)
Driver updates Application updates Engine updates OS updates Virus signature updates
Engine updates
Virus signature updates
Which of the following is a common firewall type used for protecting a single computer? (Select 2 answers)
Host-based firewall
Software firewall
Network-based firewall
Hardware firewall
Host-based firewall
software firewall