quiz 4.2 Flashcards

1
Q

You should rename both the _______________________________because these accounts are created by default. —

A

Administrator and Guest accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You should also disable the ________________. The __________________ should only be enabled in certain instances and should only be enabled temporarily.

A

Guest account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Power Users group is a special group that was granted some —

A

advanced permissions in Windows XP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

While this group is retained in Windows 7 for legacy purposes, it has _____________privileges than a standard user. —

A

no more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware tokens, server locks, and door locks are security concepts considered —

A

“something you have.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If hardware tokens are the sole method of user authentication, safeguards must be put in place to ensure security should they are lost or stolen. They are best implemented as part of a —

A

multifactor authentication system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________________are some type of physical object that a user must have during the login process to prove possession of the device.

A

Hardware tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Door locks require ____________________to open, whether the key is a typical metal key, a keypad, a smart card, or a key fob. —

A

(“something you have”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Biometric devices are based on the security concept of ______________________They match a user’s uniquely identifiable physical attribute to a previously stored value. They are among the most secure physical security measures. —

A

“something you are.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The default permission position in a secure network should be —

A

implicit deny.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This will ensure that if a user or group does not have an explicit allow permission configured, the access will default to an —

A

implicit deny.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An ______________should be the last rule contained on any firewall because most firewalls do not default to this setting.

A

implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This implicit deny firewall rule is often defined with a ______________statement. On Windows servers, the access control list (ACL) defaults to an implicit deny. —

A

Drop All

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Configure the firewall to allow only the traffic that is needed and to deny all other traffic. —

A

Firewall settings -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______________ is a function typically performed on Network Address Translation (NAT) device. One port number is set aside on the gateway for the exclusive use of communicating with a service in the private network, located on a specific host. External hosts must know this port number and the address of the gateway to communicate with the network-internal service. This hides the real IP address of the destination device or server to protect it from connections outside the LAN. —

A

Port forwarding/mapping -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This prevents communication on unused ports. Ports that are not needed for communication should always be disabled. —

A

Disabling ports -

17
Q

This allows you to control the content that can be displayed on a device. —

A

Content filtering / parental controls -

18
Q

This ensures that the device has the most recent enhancements, including security enhancements. —

A

Update firmware -

19
Q

Network devices should be secure from physical access, which usually means locking them in closets specifically designed for this type of equipment. —

A

Physical security -