Lesson 8 - Chapter 2: Workstation and Mobile Device Security Flashcards

1
Q

What are the 9 best practices for creating strong passwords?

A
  1. Don’t use dictionary words
  2. Don’t use names or places
  3. Set a minimum length
  4. Use a variety of character types
  5. Characters should not be in a predictable order (capital at front, numbers at end)
  6. Don’t use the names of things meaningful to you
  7. Don’t use any serial or memorable key sequences (keyboard closeness)
  8. Don’t use the same password at more than one account or website
  9. Use a password management app
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s a dictionary attack?

A

A password-guessing app guesses every word in the dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Passwords should be a minimum length of?

A

12 characters, preferably longer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is serial/memorable key sequences?

A

sequences that appear together on a keyboard (close to each other in sequence)

like QWERTY, zxcvb, asdfg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is local security policy?

A

A system admin can use this policy to set up workstations to require certain password policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s the snap-in called for Local Security Policy?

A

secpol.msc

snap-in = individual utilities in MMC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is enforce password history?

A

the maximum number of unique passwords used for your account before you’re able to use a previously used password

(Microsoft recommends 24 unique password changes before an old one can be used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is minimum password age?

A

the maximum number of days a password must be used before it can be changed again

0 = user can change the password anytime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is minimum password length audit?

A

turns on an audit function that creates a log file entry each time a user creates a password less than a certain value

(<12, any passwords less than 12 characters will have a log file entry)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Relax Minimum Length Limits?

A

allow/disallows the minimum password length to be greater than 14 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is store passwords using reversible encryption? What should you make sure to do with this setting?

A

The password stored with reversible encryption can be exposed by an attacker using advanced methods so MAKE SURE THIS SETTING IS DISABLED (disabled by default)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you set policies for multiple PCs at once?

A

use Active Directory Group policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a boot password?

A

used on the motherboard’s firmware (BIOS/UEFI) setup utility to prevent booting the system by unauthorized folks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a supervisor password?

A

a password for the mobo firmware setup utility that prevents unauthorized users changing the settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Can you boot directly into UEFI setup?

A

No for security reasons, but you can access it by triggering a special reboot that dumps you into the UEFI setup utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the difference between accessing the UEFI firmware and BIOS firmware?

A

Accessing UEFI starts from within Windows, accessing the BIOS is an external process (during boot)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 5 possibilities of keys to press to access BIOS setup utility during bootup? (depends on the manufacturer of the motherboard)

A
  1. Del
  2. F2
  3. Esc
  4. F10
  5. F12
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Encourage users to do what when they are going to step away from their PC?

A

Locking their desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do you manually lock the desktop? (2)

A

Start > Signed-in User > Lock

CTRL + Alt + L (didn’t work for me)

20
Q

How do you automatically trigger a lock after a certain amount of idle time? What is it called? 5 steps

A

It’s called a screen saver lock

  1. Settings > Find > Type Screen saver
  2. Turn the screen saver on/off
  3. “On resume, display logon screen” check
  4. Set the wait value
  5. (Optional) Choose a screen saver from the drop-down list
21
Q

Windows 10/11 include 2 features to automatically open or execute the content of an optical disc when inserted. Which are they?

A
  1. AutoRun
  2. AutoPlay
22
Q

Of AutoRun and AutoPlay, which gives control to the user?

A

AutoPlay, it displays a a dialog box that lists the options available to the user. AutoRun automatically starts content (USB, movies, discs)

23
Q

How do you disable AutoRun/AutoPlay?

A

Settings > Devices > Autoplay > Disable

24
Q

Users should not use an ___ account for every day work

A

admin

(more damage can be done if hacked or exposed to malware)

25
Q

The permissions that govern what a particular user account is allowed to do in Windows are called?

A

policies

26
Q

What is local security policy?

A

the app you use to do account management in setting user permissions

(restricts actions of group or account)

27
Q

Which Windows client has a Local Security Policy?

A

Every Windows client except Home

28
Q

What’s an easy way to set the same policies for many workstations?

A

Use the user and group management features in Active Directory on the domain controller

29
Q

What do you type in search when you’re trying to open Local Security Policy?

A

secpol

30
Q

In Local Security Policy, how do you see the current policies and the groups affected?

A

Local Policies tree > User Rights Assignment (and scroll through list)

31
Q

How do you learn more about a policy?

A

Double-click it and click the Explain tab

32
Q

How do you prevent a group from performing a task?

A

Local Security Setting tab > Click the group > Remove > Apply

33
Q

What is an account lockout duration?

A

creates a delay of certain minutes after the Account lockout threshold of wrong guesses has been met

(stops brute-force or dictionary attacks from going on endlessly)

34
Q

What do you use to set up logon time restrictions for specific users? (besides Local Security Policy) [2]

A

group policy on a domain controller
or
using the net user elevated prompt command on a workgroup/individual PC

35
Q

What are the 5 best security practices for account management?

A
  1. Restrict user permissions
  2. Restrict logon times
  3. Disable the Guest account
  4. Using failed attempts lockout
  5. Using timeout/screen lock
36
Q

What is the app called that provides a convenient one-stop panel for a variety of workstation security settings?

A

Windows Security

37
Q

How do you access the Windows Security app?

A

Settings > Search ‘security’ > Windows Security

38
Q

What is dynamic lock?

A

it automatically locks your PC when you step away from it by tracking the proximity of the phone to the PC via Bluetooth

(out of range = it locks)

[Under account protection in Windows Security]

39
Q

Can there be more than 1 type of firewall?

A

Yes, more than would may be required if the network’s isn’t robust enough. (software firewall, domain, private network, public, etc)

40
Q

What is reputation-based protection? (Windows Security App and Browser Control)

A

Helps block unwanted apps, files, and websites

(they use publicly available information about each website’s reputation to see if they’re safe)

41
Q

What is exploit protection? (Windows Security, App and Browser Control)

A

includes a variety of system settings for protecting the system from malware

42
Q

What is device security in the Windows Security app?

A

virtualization-based security. Main setting is memory integrity which prevents attacks from inserting malicious codes into high-security processes

(can refuse to turn on if your drivers are incompatible)

43
Q

What is mobile device management? (MDM) What does it help organizations do?

A

enables an organization to manage/monitor the use of mobile devices that connect to the internal network

44
Q

How is MDM implemented?

A

implemented through an entire domain through server software

45
Q

What is one of MDM’s main objectives?

A

limit the loss of proprietary data

46
Q

What’s a benefit of MDM that reduces workload?

A

allows IT admins to automate device management processes (remotely)