Logical Security Flashcards

1
Q

What is Active directory?

A

A type of hierarchical database structure used in Windows Server environments that enables centralized management of devices and resources on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.

A

Login script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What term describes a large network of Windows-based PCs under single administration?

A

Windows domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.

A

Group policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Windows Active Directory service allows for grouping users and computers into containers known as:

A

Organizational Units (OUs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the Windows Active Directory Group Policy settings allows network administrators to map a folder on a user’s PC to a server-based location?

A

Folder redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of a soft token?

A

Authenticator app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of software enables a centralized administration of mobile devices?

A

MDM (Mobile device management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the name of a logical security access control method in which a 48-bit physical address assigned to each Network Interface Card (NIC) is used to determine access to the network?

A

MAC address filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example implementation of certificate-based authentication?

A

Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus definition database files contain:

A

Detection patterns for known viruses.

To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An antivirus database entry used for identifying malicious code is known as virus:

A

Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An antivirus software is kept up to date via: [2]

A
  • Engine updates

- Virus signature updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are common firewall types used for protecting a single computer?

A
  • Host-based firewall

- Software firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What firewall types would provide the best protection for an ingress/egress point of a corporate network? [2]

A
  • Hardware firewall

- Network-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A set of firewall entries containing information on traffic considered safe enough to pass through is know as:

A

Whitelist