MS Win OS Basic Security Flashcards

1
Q

NTFS Permissions apply to what types of:

  • Users
  • Objects
A
  • Network and Local Users
  • Folders and Files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Windows resource with conflicting NTFS and share permissions applied to it will assume:

A

The most restrictive permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Share permissions on a shared Windows folder:

  • Grant the user Read access
  • Local NTFS permissions grant the user Modify access.

What are the effective user permission levels?

A
  • Read Permission when accessing share remotely
  • Modify Permission when accessing the share locally
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the correct hierarchy of precedence for permissions settings in NTFS?

A
  1. Explicit Deny
  2. Explicit Allow
  3. Inherited Deny
  4. Inherited Allow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What command is used to display or change file attributes?

  • What are 4 available options?
  • What symbols are used to Set/remove attributes?
A

attrib

  • Read (R), Archive (A), System (S), Hidden (H)
  • Set(+), Remove(-)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Microsoft has 3 encryption systems

What are they and how are they different?

A
  • Bitlocker - Encrypts drives
  • BitLocker To Go - Encrypts USB Drives
  • EFS - Encrypts Files and Folders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An account policy setting that forces users to produce a new password every time they are required to change their old password is known as:

A

Password history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A sticky note with a password kept on sight in user’s cubicle would be a violation of which of the following policies?

A

Clean Desk Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the 3 disk formatting types

A
  • Quick - Fastest. Deletes File System table, but other data is recoverable
  • Standard/High-Level - Normal Speed. Erases all data by overwritting.
  • Low-Level - Slowest. Only done my MFG.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which formatting type(s) would typically be performed by a user intending to reinstall an OS?

A

Standard or High-Level Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In NTFS, a folder or file moved from one location to another on the SAME VOLUME inherits the permissions of its new parent folder. (T/F)

  • What permissions would the file/folder have?
A

False

  • The original permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In NTFS, a folder or file copied or moved from one location to another on a DIFFERENT VOLUME inherits permissions of its new parent folder. (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows allows users to invoke the UAC Prompt and run an application with administrator account permissions.

What are 3 ways to access this?

A
  • Right-Click > Run as Admin
  • Start Menu > CTRL + SHIFT > Left Click
  • RUN > Type App Name > CTRL + SHIFT + ENTER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the difference between:

  • AutoPlay
  • AutoRun
A
  • AutoPlay displays a dialog box w/options for newly mounted media
  • AutoRun enables automatic execution of code contained on newly mounted media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly