Lesson 8A Configure Workstation Security Flashcards

1
Q

Password Best Practices

A

Effective user security depends on strong credential management, effective account policies, and best practice end-user behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Password Rules

A

Make passwords sufficiently long-12+ character length is suitable for an ordinary account user.
Administrative passwords should be longer.

Choose a memorable phrase, but do not use any personal information- Anything that a threat actor could discover or guess should not be used in a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Complexity Requirements
Expiration Requirements

A

Complexity requirements-Rules designed to enforce best-practice password selection, such as minimum length and use of multiple character types.
Expiration Requirements- Rules designed to enforce best-practice password use by forcing regular selection of new passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BIOS/UEFI Passwords

A

Passwords set in system firmware to prevent unauthorized booting of a computer (user password) or changes to system setup (supervisor password).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

End User Best Practices

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Log off when not in use

A

A lunchtime attack is where a threat actor is able to access a computer has been unlocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure/protect critical hardware (such as laptops)

A

Users must also be alert to the risk of physical theft of devices. Portable computers can be secured to a desk using a cable lock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure personally identifiable information (PII) and passwords

A

Paper copies of personal and confidential data must not be left where they could be read or stolen. A clean desk policy ensures that all such information is not left in plain sight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Account Management

A

Policies are used to determine what rights and privileges each employee should be assigned. These policies should be guided by the principle of least privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Restrict User Permission(2 types)

A

File permissions control whether a user can read or modify a data file or folder, either on the local PC or across the network.(Permissions are only modified by data owners or file server administrator.
Rights or privilege control what system configurations changes a user can make to a PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Change Default Administrator Account and Password

A

The new password must be treated with highest level of security available. Any use of the default administrator account must be logged and accounted for. Using this account for sign-in should be an unusual event that generates an alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disable Guest Account

A

A guest account allows unauthenticated access to the computer and may provide some sort of network access too.
only enabled to facilitate passwordless file sharing in a Windows workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Account Policies

A

Enforcing requirements as controls imposed by the OS. Which can be enforced via Security Policy snap-in(secpol.msc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Restrict Log-in Time

A

Used to prevent an account from logging in at an unusual time of day or night, or during the weekend.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Failed Attempt Lockout

A

Allows a maximum amount of attempts prior to the computer locking out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Concurrent Logins

A

Determines how many computers an individual should be allowed to log in at a time.

17
Q

Use timeout/screenlock

A

Locks the Desktop whenever the system detects no user-activity.

18
Q

Execution Control

A

Process of determining what additional software may be installed on a client or server beyond its baseline to prevent the use of unauthorized software.

19
Q

Trusted/Untrusted Software Sources

A

restrict the ability of users to run unapproved program code, especially code that can modify the OS, such as an application installer.
Administrator and Standard user accounts, along with User Account Control (UAC) and system policies, to enforce these restrictions.

20
Q

AutoRun and AutoPlay

A

-when an optical disc is inserted or a USB drive is attached, Windows would automatically run commands defined in an autorun.inf
-Windows mechanisms for automatic actions to occur when a peripheral storage device is attached.

21
Q

Windows Defender Antivirus

A

Security scanner installed and enabled by default in Windows that provides protection against general malware types.

22
Q

Windows Defender Firewall

A

Implements a personal/host firewall to filter inbound and outbound network traffic.
Port Security
Application Security
Address

23
Q

Port Security

A

triggers are based on the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number used by the application protocol.

24
Q

Application security

A

triggers are based on the process that listens for connections.

25
Q

Address triggers

A

Are based on the IP or FQDN of the server or client hosts

26
Q

Firewall can be accessed via:

A

wf.msc the firewall can be turned on or turned off, and you can switch the default policyfor inbound and outbound traffic.
Allow or Block

27
Q

Encrypting File Systems

A

Microsoft’s file-level encryption feature available for use on NTFS.
To apply encryption: Open the file’s/folder’s properties sheet and select advanced. Check the encrypt content box.

28
Q

Windows Bitlocker

A

BitLocker can be used with any volumes on fixed (internal) drives. It can also be used with removable drives in its BitLocker To Go form.

29
Q

Windows Bit Locker cont.

A

When the data is encrypted, the user must have access to the encryption key to access it. BitLocker can make use of a trusted platform module (TPM) chip in the computer to tie use of a fixed disk to a particular motherboard.