Lesson 8: Managing Security Settings Flashcards
Rules designed to enforce best-practice password selection, such as minimum length and use of multiple character types.
Complexity requirements
Rules designed to enforce best-practice password use by forcing regular selection of new passwords.
expiration requirement
Passwords set in system firmware to prevent unauthorized booting of a computer (user password) or changes to system setup (supervisor password).
basic input/output system (BIOS)
or
unified extensible firmware interface (UEFI)
PII
personally identifiable information
Process of determining what additional software may be installed on a client or server beyond its baseline to prevent the use of unauthorized software.
Execution control
Windows mechanisms for automatic actions to occur when a peripheral storage device is attached.
AutoPlay settings
Security scanner installed and enabled by default in Windows that provides protection against general malware types.
Windows Defender Antivirus
UDP
User Datagram Protocol
Information about new viruses and other malware used to update antivirus scanners.
Definition / pattern updates
TCP
Transmission Control Protocol
Microsoft’s file-level encryption feature available for use on NTFS. Feature of NTFS supports file and folder encryption.
Encrypting File System (EFS)
Fix problems or make improvements to the scan software itself.
Scan engine / component updates
What does blocking TCP/80 prevent clients from connecting to?
Blocking TCP/80 prevents clients from connecting to the default port for a web server.
FDE
Full Disk Encryption
You are completing a checklist of security features for workstation deployments. Following the CompTIA A+ objectives, what additional item should you add to the following list, and what recommendation for a built-in Windows feature or features can you recommend be used to implement it?
Password best practices
End-user best practices
Account management
Change default administrator’s user account/password
Disable AutoRun/AutoPlay
Enable Windows Update, Windows Defender Antivirus, and Windows Defender Firewall
Data-at-rest encryption.
In Windows, this can be configured at file level via the Encrypting File System (EFS) or at disk level via BitLocker.
What type of account management policy can protect against password-guessing attacks?
A lockout policy disables the account after a number of incorrect sign-in attempts.
True or false? An organization should rely on automatic screen savers to prevent lunchtime attacks.
False.
A lunchtime attack is where a threat actor gains access to a signed-in user account because the desktop has not locked. While an automatic screensaver lock provides some protection, there may still be a window of opportunity for a threat actor between the user leaving the workstation unattended and the screensaver activating. Users must lock the workstation manually when leaving it unattended.
A security consultant has recommended more frequent monitoring of the antivirus software on workstations. What sort of checks should this monitoring perform?
That the antivirus is enabled, is up to date with scan engine components and definitions, and has only authorized exclusions configured.
Installer package that can be verified by a digital signature or cryptographic hash.
Trusted source
Installer package whose authenticity and integrity cannot be verified.
Untrusted source
Add-on that uses the browser API to implement new functionality.
Extensions
API
application programming interface
TLS
Transport Layer Security
Software installed to a web browser to handle multimedia objects embedded in web pages. (Play or show some sort of content embedded in a web page, such as Flash, Silverlight, or another video/multimedia format.)
Plug-ins
Identification and authentication information presented in the X.509 format and issued by a Certificate Authority (CA) as a guarantee that a key pair (as identified by the public key embedded in the certificate) is valid for a particular subject (user or host).
digital certificates
CA
Certificate authority
Browser feature or extension that prevents sites from creating new browser windows. (Prevent a website from creating dialogs or additional windows.)
Pop-up blockers
Using HTTPS to browse a site where the host has presented a valid digital certificate issued by a CA that is trusted by the browser.
secure connection
Browser feature or add-in that prevents third-party content from being displayed when visiting a site. (Use more sophisticated techniques to prevent the display of anything that doesn’t seem to be part of the site’s main content or functionality. )
Ad-blockers
True or false? Using a browser’s incognito mode will prevent sites from recording the user’s IP address.
False.
Incognito mode can prevent the use of cookies but cannot conceal the user’s source IP address. You do not need to include this in your answer, but the main way to conceal the source IP address is to connect to sites via a virtual private network (VPN).
Cookies, site files, form data, passwords, and other information stored by a browser.
cache