Logical Security Flashcards
What is Active directory?
A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network
On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.
Login script
What term describes a large network of Windows-based PCs under single administration?
Windows domain
In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.
Group policy
Windows Active Directory service allows for grouping users and computers into containers known as:
Organizational Units (OUs)
Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user’s PC to a server-based location?
Folder redirection
What is an example of a soft token?
Authenticator app
What type of software enables a centralized administration of mobile devices?
MDM (Mobile device management)
What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network?
MAC address filtering
What is an example implementation of certificate-based authentication?
Smart card
Virus definition database files contain:
Detection patterns for known viruses.
To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature.
An antivirus database entry used for identifying malicious code is known as virus:
Signature
An antivirus software is kept up to date via: [2]
- Engine updates
- Virus signature updates
What are common firewall types used for protecting a single computer?
- Host-based firewall
- Software firewall
What firewall types would provide the best protection for an ingress/egress point of a corporate network? [2]
- Hardware firewall
- Network-based firewall