Module 2 Day 1: users, administrators, groups--supplemental readin for windows passwords Flashcards

1
Q

What will I be responsible for with other people’s machines/

A

setup, troubleshootin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what will I learn how to manage multiple accounts on?

A

one machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are all users on a computer isolated from?

A

other users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the two different types of users on a computer?

A

standard and administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what kind of user is given access to a machine, but has restricted access to do things like install software or change certain settings?

A

a standard user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what kind of user has complete control over a machine?

A

an administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what kind of user can view anyone’s account, change and remove anyone on the computer, and view every single file?

A

administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

can you have multiple admins on one mchine?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

who is the default admin on your personal machine?

A

you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

who is the administrator on a public machine?

A

the person who runs and maintains the machine, like an IT support specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

who grants access for users?

A

admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

who installs software?

A

admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

who changes restricted settings?

A

admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why don’t we let just anyone have admin permissions?

A

bloated computers, infected machines, lack of organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are put in groups together according to levels of access and permission to carry out certain tasks?

A

users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

who decides which users get what permissions for what tasks?

A

admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what does an admin sometimes give permissions out according to?

A

the type of group a user is in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

how do you know what kind of user you are?

A

By what the computer allows you to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what do you use to view user and group information in Windows?

A

Computer management tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

how do you navigate to the computer management tool?

A

search in the search application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

in computer management, at the top of the sidebar, what does it say? if you are managing a single machine locally

A

Computer Management (Local)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A network of computers, users, files, etc that are added to a central database

A

windows domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

in an enterprise environment, what would I use to manage multiple machines?

A

a domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what can I do if I am the admin of a domain?

A

view accounts in computers from any machine in it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What menu in computer management is under computer management local?

A

System tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

in computer management system tools, what tool Let’s you schedule programs and tasks to run at certain times, like shutting the computer off at a certain time automatically?

A

Task scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

in computer management, what system tool shows the folders that different users on the machine share with each other?

A

Event viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

if a user stores files on a shared folder who can view that folder?

A

anyone who has access to that folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

in the computer management system tools where do we do our user and group management?

A

local users and groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

in computer management system tools, what tool shows monitoring for the resources of our machine like CPU and RAM?

A

performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

in the computer management system tools, where do we go to manage devices on our computer like our network cards sound cards monitors and more?

A

Device manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

in computer management where do we have a submenu for disk management

A

under the storage menu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

In computer management, what menu shows us the programs and services that we have available on the system, and allows us to enable or disable services like DNS here?

A

the services and applications menu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

where do we find all the essential settings that we as administrators need to change?

A

computer management tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what is more efficient, the computer management tool or the default settings application?

A

computer management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

in computer management, where can we see what kind of user account we have and what groups we are part of?

A

local users and groups Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are two built in accounts that you can see in computer management, local users and groups, users

A

administrator and guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What account lets you log in using the administrator username and whatever the administrator password is on the computer, but is disabled by default?

A

the local administrator account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

why would it be dangerous to have the local administrator account logged into at all times?

A

this account has unfettered access on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

in computer management, Under local users and groups, in users, if you double click on the user that you want to look at, what page is brought up?

A

username properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what three tabs are on the user name properties page?

A

general, member of, profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

In the (username) properties page, where can you see some basic information about the users, as well as some options?

A

General tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

in the username properties page, where can I select an option to force a user to change their password the next time they log in?

A

General tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

why is it useful to require a user to change their password the next time that they log in

A

the password could be compromised and we don’t want to risk someone else logging into the account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

in (username) properties, where can I force a user to be unable to change their password?

A

general tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

in (username) properties, where can I force a user to never have an expired password?

A

general tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

in (username) properties, where can I force an account to be disabled?

A

general tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

in (username) properties, where can I force an account to be locked out?

A

general ta b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What does enabling or disabling an account mean

A

making it active or inactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What does it mean when a user cannot log in?

A

account is locked out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Why would you make an account locked out

A

I disgruntled employee could want to mess things up in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

in (username) properties, where can you see which groups (username) is part of?

A

the Member of tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What can you do instead of being logged into the administrator account all of the time?

A

you can be logged into your own account and use administrative powers when you need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

what does UAC stand for?

A

User Account Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

what feature in windows prevents unauthorized changes to a system?

A

UAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

what does an administrator need to do to authorize changes?

A

enter password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

in (username) properties, where can you change settings about your user profile, like where you want your home folder to be?

A

Profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

when does the profile tab of the (username) properties page come in handy?

A

when you are managing many users on a domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

in Computer management, on the groups menu in the sidebars, what can you see?

A

which groups are available and who their members are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What command in the windows PowerShell cli lets you view the list of users on the computer?

A

Get-LocalUser

61
Q

For command in windows PowerShell lets you view the list of groups on the Local machine

A

Get-LocalGroup

62
Q

What command on Windows PowerShell lists your user account, all users, and some default accounts that are just part of windows

A

Get-LocalUser

63
Q

What’s the multitude of groups listed by the Get-LocalGroup?

A

Built in groups, important but not likely to change, except for administrators

64
Q

Why is it important to control who is an administrator on a machine

A

administrators can do anything that they want to on a machine

65
Q

How can you see who is in a specific group in PowerShell? Check the Administrators group.

A

Get-LocalGroupmember Administrators

66
Q

what PowerShell version do you need to be running in order to run the Get-LocalUser and Get-LocalGroup commands?

A

PowerShell 5.1 or newer

67
Q

If your organization has lot of machines what is commonly used to manage a lot of user accounts across those machines

A

active directory To manage user accounts in a central directory service

68
Q

how does access management work in Linux?

A

like it does in Windows

69
Q

What is the first user that gets automatically created when we install a Linux operating system?

A

root user

70
Q

What user in Linux has all the privileges on the operating system and is the superuser?

A

Root user

71
Q

what do you call someone who is granted access to use the superuser powers in a Linux system

A

a Super User

72
Q

why don’t we want to be in root all of the time as a Linux user?

A

it can be really dangerous because it has unrestricted access on the machine. if you make just one mistake you can damage or delete or modify something important

73
Q

what can we do in Linux instead of logging in as the root?

A

tell the shell we want to run one command as root, Sudo

74
Q

what is sudo similar to on Windows?

A

UAC

75
Q

what does sudo stand for?

A

super user do

76
Q

where do you put sudo next to commands?

A

at the front

77
Q

what can you use if you don’t want to run sudo every time you need to run a command that requires root privileges?

A

use the su command

78
Q

what does su stand for?

A

substitute user

79
Q

what does the su command allow you to do?

A

change to a different user, and defaults to root if you don’t specify a user.

80
Q

how do you log in as root?

A

su sudo -

81
Q

how do you exit out of root? linux

A

exit

82
Q

how to view who has access to run sudo?

A

cat /etc/group
file. This is also how you view membership for all groups. One s, not plural.

83
Q

what does each line represent in the /etc/group file?

A

a different group

84
Q

on the sudo line in the /etc/group file, how many fields are there?

A

four, separated by :

85
Q

what is the first field specified in each line of the /etc/group file?

A

group name

86
Q

what is the second field specified in a line in the /etc/group file?

A

group password

87
Q

What does the x that shows in the etc/group file in for the group password mean?

A

the password has been hashed, not encrypted.

88
Q

What does it mean for a password to be hashed/

A

it was converted into a unique string of characters, called a hash, which is stored on the server

89
Q

what is used to verify the password on Linux when a user attempts to join the group?

A

the hash

90
Q

in the etc/group file, in the line, what is the third group?

A

the ID of the group. Group ID.

91
Q

What does Linux OS use when it runs a task that involves a group instead of a group name?

A

group ID

92
Q

What is the last field in a line in the /etc/group file ?

A

the list of users in a group.

93
Q

how do you view the users on your machine?

A

/etc/passwd

94
Q

in /etc/passwd, what are most accounts that are shown?

A

processes running on the computer that we need to associate with a user, so our system has users with different permissions that are needed to run these processes.

95
Q

what is the first field in a line of the /etc/passwd file?

A

username

96
Q

what is the second field in a line of the /etc/passwd file?

A

user password. not actually stored in this file, but hashed and stored in a different file.

97
Q

what is the third field in a line of the /etc/passwd file?

A

UID, User ID. How our system identifies a user, not the username. two numbers separated by :

98
Q

what is the UID of root?

A

0:0

99
Q

What add security to our user accounts and machines

A

passwords

100
Q

when I am setting up my own password who should know the password

A

only me

101
Q

when I am managing other people’s accounts on a machine who should know what their password is

A

only them

102
Q

who should enter the password themselves

A

the user who the account belongs to

103
Q

How will I reset a password on the gui on Windows? Make a user named Sarah have to change her password the next time she logs in.

A

Open Computer management, go to Local Users and Groups, Right click on Sarah, click properties, check the box that says user must change password at next login. Apply, hit ok.

104
Q

if a user forgot their password, how can you set one for them manually?

A

right click on the user’s name, select ‘set password’

105
Q

what are the caveats for resetting a user’s password manually for them?

A

losing access to certain credentials, data, information, permanent access loss for files

106
Q

how do you change a local password in PowerShell?

A

use the DOS style net command

107
Q

Why not use the native PowerShell command to change a local password?

A

it’s complicated and requires scripting to use

108
Q

what command changes local user passwords?

A

net

109
Q

what does the /? parameter do?

A

gets help. Useful with net command and other DOS commands

110
Q

how do you change a command for a user? PowerShell CLI

A

net user (username) ‘password’

111
Q

for the command in PowerShell
net user username ‘password’, what is the best way to write the password part?

A

use asterisk instead of writing the password on the command line, so net will pause and ask you to enter your password
like:
net user username *

112
Q

why is it better to use asterisk instead of entering your password on the command line?

A

the commands you run on the machine could be recorded in a log file that is sent to a central logging service. It is best that any kind of password is not logged like this.

113
Q

what is the problem with the asterisk approach for doing it for another user?

A

if you do it for them, you’ll know their password. not good to know a user’s password if you are not the user.

114
Q

what parameter will make it so that the user will have to change their password the next time they log into the system?

A

/logonpasswordchg:yes

115
Q

in PowerShell, how would I force Victor to change his password on the next log on?

A

net user victor /logonpasswordchg:yes

116
Q

how do most users log into their computer and remote computers?

A

combination of user name and password typed at the keyboard

117
Q

what common attack method do attackers use to discover a password which involves attempting to log on by guessing likely words and phrases like kid names, city of birth, local sport teams?

A

Guessing.

118
Q

what common attack method do attackers use to discover a password which involves using an automated program that includes a file of texts of words, and repeatedly attempts to log on to the target system using a different word from the text file on each try?

A

Online Dictionary Attack

119
Q

what common attack method do attackers use to discover a password which involves getting a copy of the file where the hashed or encrypted copy of user accounts and passwords are stored and uses an automated program to determine what the password is for each account? very fast once the attacker gets the password file

A

Offline dictionary attack

120
Q

what common attack method do attackers use to discover a password which involves determining passwords that may not be included in the text file used in attacks, and can be attempted online, but is usually offline using a copy of the target’s password file. The attacker uses an automated system that generates hashes or encrypted values for all possible passwords and compares them to the values in the password file

A

Offline Brute Force attack

121
Q

what counts as a strong password?

A

a password that includes characters from at least three of the five Character classes

122
Q

what are the five character classes for passwords?

A

lowercase letters, uppercase letters, numerals, non-alphanumerics, Unicode characters

123
Q

what characters do not fall under the password groups and don’t count toward password complexity requirements?

A

space characters

124
Q

what passwords should be composed of more groups?

A

admin account passwords

125
Q

what passwords must be easily remembered?

A

passwords used by humans

126
Q

how can you overcome the difficulty of making a strong password that is easy to remember?

A

make a pass phrase instead of passwords

127
Q

how are passwords stored in Windows?

A

hashes. LAN manager, LM hash, NTM hash

128
Q

what hash is not really a hash?

A

LM

129
Q

what hash is very easy to break?

A

LM hash

130
Q

what will most password cracking tools do for LM hashes?

A

start by cracking them and then vary the alpha characters int he cracked password to generate the case-sensitive passwords.

131
Q

why is NTLM hash called unicode hash?

A

it supports full unicode character set.

132
Q

what is a measure of disorder in a system?

A

entropy

133
Q

what type of character can I use if I want to be super extra secure?

A

Alt characters, to access the whole unicode set.

134
Q

how often should passwords be changed?

A

every 42 days, and old ones should never be reused

135
Q

why do you need to change your password so often?

A

cracking takes time, but any hacker can crack any password given enough time and resources

136
Q

steps in determining organization password policy

A

Identifying what computer operating systems are present on your organization’s network

Understanding what the limitations are for those operating systems

Defining what the technical requirements for passwords will be on your organization’s network.

Determining how much formality is appropriate regarding the documentation and communication of the password policy for your organization

Documenting the password policy in writing

Communicating the password policy to the users before implementing it on your systems

Implementing the password policy on your organization’s computer systems

Reminding users on an ongoing basis about importance of observing the password policy and other corporate security policies

137
Q

Determines the number of unique new passwords a user must use before an old password can be reused. It can be set between 0 and 24; if set to 0, then enforce password history is disabled.

A

Enforce Password History: recommend set to 24 passwords

138
Q

Determines how many days a password can be used before the user is required to change it. It can be set between 0 and 999; if set to 0, then passwords never expire. Setting this too low may cause a great deal of frustration for your users, setting it too high or disabling it will give potential attackers more time to try to break users’ passwords.

A

Maximum password age: set to 42 days for most organization

139
Q

Determines how many days a user must keep their new password before they can change it. This setting is designed to work with the Enforce password history setting so that users cannot quickly reset their password 24 times and then change their password back to the old password. It can be set between 0 and 999; if set to 0, then users will be able to immediately change their password right after changing it.

A

Minimum Password age. set to 2 days for most organizations

140
Q

Determines how short passwords can be. Although computers running Windows 2000, Windows XP, and Windows Server 2003 support passwords up to 128 characters, this setting can only be set between 0 and 14 characters. If it is set to 0, then users are allowed to have blank passwords; this value should never be used

A

Minimum password length: set to 8 characters

141
Q

Determines whether or not password complexity is enforced.
When this setting is enabled user passwords will have the following requirements:
The password is at least six characters long.

The password contains characters from three of the following five categories: English uppercase characters (A - Z); English lowercase characters (a - z); base 10 digits (0 - 9); non - alphanumeric (For example: !, $, #, or %); Unicode characters.

The password does not contain three or more characters from the user’s account name. If the account name is less than three characters long then this check is not performed because the rate at which passwords would be rejected would be too high. When checking against the user’s full name several characters are treated as delimiters that separate the name into individual tokens: commas, periods, dashes/hyphens, underscores, spaces, pound-signs and tabs. For each token that is three or more characters long, that token is searched for in the password, and if it is present, the password change is rejected. For example, the name “Erin M. Hagens” would be split into three tokens: “Erin,” “M,” and “Hagens.” Since the second token is only one character long it would be ignored. Therefore, this user could not have a password that included either “erin” or “hagens” as a substring anywhere in the password. All of these checks are case insensitive.

A

Passwords must meet complexity requirements: enable this setting

142
Q

what command do you need in Linux to change your password?

A

passwd

143
Q

How would cindy change her password? What command would she use?

A

passwd cindy

144
Q

when you change your password in LInux, what are the steps it walks you through?

A

changing password for (user)
current pass
enter new pass
retype new pass
passwd: password updated successfully

145
Q

What happens when you set a Linux password?

A

it is securely scrambled, then stored in a special privileged file called /etc/shadow

146
Q

who can read /etc/shadow?

A

root. only root .

147
Q

even if you had access to /etc/shadow, would you be able to read it?

A

not really. It’s hashed.

148
Q

how do you force a user to change their password in Linux?

A

use the -e flag,
sudo passwd -e username

149
Q

what does the -e flag do after passwd?

A

immediately expires a user’s password