Exam Compass - Workstation Security Quiz Flashcards
The term “Data-at-rest encryption” refers to the encryption process that is applied to data residing in persistent storage (e.g., internal storage drive inside computer case).
True
False
True
The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (such as routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.
True
False
True
The two factors that are considered important for creating strong passwords are: (Select 2 answers)
Password length
Minimum password age
Password history
Password complexity
Maximum password age
Password length
Password complexity
A strong password that meets the password complexity requirement should contain: (Select the best answer)
Uppercase letters (A-Z)
Digits (0-9)
Non-alphanumeric characters if permitted (e.g., !, @, #, $)
Lowercase letters (a-z)
A combination of characters from at least 3 character groups
A combination of characters from at least 3 character groups
Which of the following password examples is the most complex?
YzGdL3tU8wx
T$7C52WL4S9@W0
G$L3tU8wY@z
@TxBL$nW@Xt*a#
G$L3tU8wY@z
An account policy setting that forces users to produce a new password every time they are required to change their old password is known as:
Password expiration
Password reuse
Password history
Password complexity
Password history
Which of the account policy settings listed below prevents users from reusing old passwords?
Password expiration
Password history
Password length
Password complexity
Password history
Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?
Minimum password age setting
Password complexity setting
Account lockout threshold setting
Login time restrictions
Minimum password age setting
Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?
Login time restrictions
Password complexity setting
Account lockout threshold setting
Maximum password age setting
Maximum password age setting
BIOS/UEFI passwords improve the security of a computer host. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on (Supervisor/Administrator password), or restrict the scope of changes a user can make in the BIOS/UEFI interface (User password).
True
False
False
The practice of implementing a computer screen lock is one of the end-user security best practices. The screen lock can be implemented as a password-protected screensaver that activates when the computer has been idle for a specific amount of time. In MS Windows, users can manually block unauthorized access by invoking the sign-in screen with the Windows logo + L key combination whenever they’re about to leave their computer desk. Screen locks can also be used as a countermeasure against brute-force attacks as they can be set to block computer access after a specified number of failed login attempts. The use of screensaver locks is an implementation of a more general security best practice which is logging off whenever the system is not in use.
True
False
True
In Microsoft Windows 10, screen lock settings can be accessed via:
Settings > Personalization > Lock screen
Settings > Update & Security > Lock screen
Settings > System > Display > Lock screen
Settings > Devices > Display settings > Lock screen
Settings > Personalization > Lock screen
Which of the answers listed below refers to a physical security measure against laptop theft?
Cable lock
Geotracking
LoJack for Laptops
Remote wipe
Cable lock
USB locks are mechanical devices used for blocking a computer’s USB ports from unauthorized access. USB locks can also be used to prevent the removal of an external USB device attached to the computer.
True
False
True
Privacy filter (a.k.a. privacy screen) is a protective overlay placed on the computer screen that narrows the viewing angle, so the screen content is only visible directly in front of the monitor and cannot be seen by others nearby. Privacy filter is one of the countermeasures against shoulder surfing.
True
False
True