quiz 4.2 Flashcards
You should rename both the _______________________________because these accounts are created by default. —
Administrator and Guest accounts
You should also disable the ________________. The __________________ should only be enabled in certain instances and should only be enabled temporarily.
Guest account
The Power Users group is a special group that was granted some —
advanced permissions in Windows XP.
While this group is retained in Windows 7 for legacy purposes, it has _____________privileges than a standard user. —
no more
Hardware tokens, server locks, and door locks are security concepts considered —
“something you have.”
If hardware tokens are the sole method of user authentication, safeguards must be put in place to ensure security should they are lost or stolen. They are best implemented as part of a —
multifactor authentication system.
_________________are some type of physical object that a user must have during the login process to prove possession of the device.
Hardware tokens
Door locks require ____________________to open, whether the key is a typical metal key, a keypad, a smart card, or a key fob. —
(“something you have”)
Biometric devices are based on the security concept of ______________________They match a user’s uniquely identifiable physical attribute to a previously stored value. They are among the most secure physical security measures. —
“something you are.”
The default permission position in a secure network should be —
implicit deny.
This will ensure that if a user or group does not have an explicit allow permission configured, the access will default to an —
implicit deny.
An ______________should be the last rule contained on any firewall because most firewalls do not default to this setting.
implicit deny
This implicit deny firewall rule is often defined with a ______________statement. On Windows servers, the access control list (ACL) defaults to an implicit deny. —
Drop All
Configure the firewall to allow only the traffic that is needed and to deny all other traffic. —
Firewall settings -
_______________ is a function typically performed on Network Address Translation (NAT) device. One port number is set aside on the gateway for the exclusive use of communicating with a service in the private network, located on a specific host. External hosts must know this port number and the address of the gateway to communicate with the network-internal service. This hides the real IP address of the destination device or server to protect it from connections outside the LAN. —
Port forwarding/mapping -