Security (1) Flashcards

1
Q

our network has 20 Windows 10 workstations. When it comes to managing patches and updates, which of the following is the best practice?

Apply patches and updates once per month.

Apply patches and updates immediately after they become available.

Apply patches and updates only if they fix a critical security flaw.

A

Apply patches and updates immediately after they become available.

Patches and updates should be applied regardless of the severity of the issue. In addition, they should be applied immediately. Use Windows Update to manage the process for you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have a Windows 10 workstation and want to prevent a potential hacker from booting to a CD from the optical drive. What should you do to help prevent this?

Restrict user permissions.

Set a BIOS/UEFI password.

Disable autorun.

A

Set a BIOS/UEFI password.

A strong Windows password will help protect Windows but does not protect the computer in general. If a user can get into the BIOS, then he can change the boot sequence, boot to a CD, and do some damage to the system. The way to protect against this is to implement a BIOS/UEFI password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of security solution generally functions as a packet filter and can perform stateful inspection?

DLP

Antivirus/anti-malware

Firewall

A

Firewall

Firewalls are among the first lines of defense in a network. The basic purpose of a firewall is to isolate one network from another. Firewalls function as one or more of the following: packet filter, proxy firewall, or stateful inspection firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following are examples of physical security methods? (Choose two.)

Biometric locks

Multifactor authentication

Privacy filters

Firewalls

A

Biometric locks

Privacy filters

Biometric locks and privacy filters are physical security methods. Multifactor authentication may require a physical device (for example, something you have) but not necessarily. Firewalls can be hardware devices but can also be software packages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user on your network reported that he got a telephone call from Diane in the IT department saying that he needed to reset his password. She offered to do it for him if he could provide her with his current one. What is this most likely an example of?

A spoofing attack

A social engineering attack

A man-in-the-middle attack

A

A social engineering attack

Social engineering is a process in which an attacker attempts to acquire information about your network and system by social means, such as talking to people in the organization. A social engineering attack may occur over the phone, over email, or in person. The intent is to acquire access information, such as user IDs and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

our corporate IT department has decided that to enhance security they want to draft a mobile device management (MDM) policy to require both a passcode and fingerprint scan to unlock a mobile device for use. What is this an example of?

Authenticator application

Biometric authentication

Multifactor authentication

A

Multifactor authentication

Anytime there is more than one authentication method required, it’s multifactor authentication. In this case, it does involve using biometrics, but the passcode is not a biometric factor. Multifactor authentication usually requires two of the following three types of inputs: something you know (password), something you have (smart token), or something you are (biometrics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Several employees at your company have been tailgating to gain access to secure areas. Which of the following security methods is the best choice for stopping this practice?

Door lock

Entry control roster

Mantrap

A

Mantrap

Tailgating refers to being so close to someone when they enter a building that you are able to come in right behind them without needing to use a key, a card, or any other security device. Using mantraps, which are devices such as small rooms that limit access to one or a few individuals, is a great way to stop tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Robert has joined your company as a network administrator. His user account name is RobertS. What is the recommended way to give Robert the administrative privileges he needs?

Add the RobertS user account to the Administrators group.

Create an account called AdminRobertS. Add that account to the Administrators group. Have Robert use the RobertS account unless he needs administrative rights, in which case he should use the AdminRobertS account.

Copy the Administrator account and rename it RobertS.

A

Create an account called AdminRobertS. Add that account to the Administrators group. Have Robert use the RobertS account unless he needs administrative rights, in which case he should use the AdminRobertS account.

Adding RobertS to the Administrators group will certainly work, but it’s not the recommended approach. Since members of the Administrators group have such power, they can inadvertently do harm (such as accidentally deleting a file that a regular user could not). To protect against this, the practice of logging in with an Administrators group account for daily interaction is strongly discouraged. Instead, system administrators should log in with a user account (lesser privileges) and change to the Administrators group account (elevated privileges) only when necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are designing a security policy for mobile phones on your network. Which of the following are common methods of biometric authentication used with mobile devices today? (Choose two.)

Fingerprint lock

Face lock

Swipe lock

DNA lock

A

Fingerprint lock

Face lock

Biometric authentication requires identification of a physical feature of the user, such as a fingerprint or facial scan. DNA is considered a form of biometric authentication, but it’s not commonly used today with mobile devices. (Imagine your phone needing to collect blood or saliva to authenticate you—no thanks!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have a Windows 7 workstation with one volume, C:, that is formatted with FAT32. What is the easiest way to enable this volume to have file- and folder-level security permissions?

Enable file and folder permissions in System Properties.

At a command prompt, type reformat c: /fs:ntfs.

At a command prompt, type convert c: /fs:ntfs.

A

At a command prompt, type convert c: /fs:ntfs.

If you’re using FAT32 and want to change to NTFS, the convert utility will allow you to do so. For example, to change the E: drive to NTFS, the command is convert e: /fs:ntfs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Luana is a member of the Dev group and the HR group. She is trying to access a local resource on an NTFS volume. The HR group has Allow Full Control permission for the payroll folder, and the Dev group has Deny Read permission for the same folder. What is Luana’s effective access to the payroll folder?

Full Control

Write

No Access

A

No Access

When there are conflicting NTFS permissions, generally they are combined, and the most liberal is granted. The exception to that is when there is an explicit Deny. That overrides any allowed permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which default Windows group was designed to have more power than normal users but not as much power as administrators?

Standard Users

Power Users

Advanced Users

A

Power Users

Microsoft wanted to create a group in Windows that was not as powerful as the Administrators group, which is how the Power Users group came into being. The idea was that membership in this group would be given Read/Write permission to the system, allowing members to install most software but keeping them from changing key operating system files. However, after Windows 7, the Power Users group now assigns permissions equivalent to the Standard user Users Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have just transformed a Windows workgroup into a small domain and are configuring user accounts. Which of the following is considered a best practice for managing user account security?

Require every user to log on as a Guest user.

Allow all users Read and Write access to all server files.

Follow the principle of least privilege.

A

Follow the principle of least privilege.

When assigning user permissions, follow the principle of least privilege; give users only the bare minimum that they need to do their job. Assign permissions to groups rather than users, and make users members of groups (or remove them from groups) as they change roles or positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Someone has placed an unauthorized wireless router on your network and configured it with the same SSID as your network. Users can access the network through that router, even though it’s not supposed to be there. What type of security threat could this lead to?

Zombie/botnet

Noncompliant system

Man-in-the-middle

A

Man-in-the-middle

An unauthorized router with a seemingly legitimate configuration is specifically known as an evil twin. Those can lead to man-in-the-middle attacks, which involve clandestinely placing something (such as a piece of software or a rogue router) between a server and the user, and neither the server’s administrator nor the user is aware of it. The man-in-the-middle intercepts data and then sends the information to the server as if nothing is wrong. The man-in-the-middle software may be recording information for someone to view later, altering it, or in some other way compromising the security of your system and session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security consultant for your company recommended that you begin shredding or burning classified documents before disposing of them. What security risk is the consultant trying to protect the company from?

Shoulder surfing

Dumpster diving

Social engineering

A

Dumpster diving

Companies normally generate a huge amount of paper, most of which eventually winds up in dumpsters or recycle bins. Dumpsters may contain information that is highly sensitive in nature, and attackers may seek it out by practicing dumpster diving. In high-security and government environments, sensitive papers should be either shredded or burned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have installed a Windows 8.1 workstation into a HomeGroup. Which of the following are recommended best practices for maximizing security regarding the Administrator account? (Choose two.)

Disable the Administrator account.

Rename the Administrator account.

Remove the Administrator account from the Administrators group.

Require a strong password.

A

Rename the Administrator account.

Require a strong password.

You should rename the default account and always require strong passwords. In Windows, you are unable to disable the Administrator account or remove it from the Administrators group

17
Q

Which digital security method makes use of encapsulation to transfer data across networks?

VPN

Email filtering

DLP

A

VPN

A virtual private network (VPN) is a private network connection that occurs through a public network. VPNs make use of tunneling, which sends private data across a public network by placing (encapsulating) that data into other packets. Even though a VPN is created through the Internet or other public networks, the connection logically appears to be part of the local network

18
Q

Which of the following are advantages of using NTFS permissions over using Share permissions? (Choose all that apply.)

NTFS permissions will override Share permissions if there is a conflict.

NTFS permissions affect users at the local computer, but Share permissions do not.

NTFS permissions are more restrictive in their access levels than Share permissions.

NTFS permissions can be set at the file level, but Share permissions cannot.

A

NTFS permissions affect users at the local computer, but Share permissions do not.

NTFS permissions can be set at the file level, but Share permissions cannot.

NTFS permissions affect users regardless if they are at the local computer or accessing the resource across the network. They can also be applied to individual files, whereas Share permissions can be applied only to folders. One set of permissions is not inherently more restrictive than the other, as either type can be used to deny access in a given situation (at least when accessing across the network)

19
Q

Which type of security method is worn by employees and usually has a picture on it?

Key fobs

ID badges

Smart card

A

ID badges

An ID badge is worn by employees to identify them. Some companies use different colored badges to indicate different functions or security privileges. Most ID badges have a picture of the user on them to prevent unauthorized use

20
Q

You and your family members all have iPhones. Someone generally forgets where they put their phone, and it would be nice to easily find it. In addition, you want to see where other family members are when they are around town. Which type of app will allow you to do this?

Remote control app

Locator app

Firewall app

A

Locator app

A locator app is what you need. Apple supplies a free app called Find My iPhone that, together with iCloud, allows multiple mobile devices and Macs to be located if powered on and attached to the Internet (via 4G, 3G, Wi-Fi, Ethernet, and so on). The app allows the device to be controlled remotely to lock it, play a sound (even if audio is off), display a message, or wipe it clean

21
Q

Which security mechanism specifies permissions for users and groups as well as the type of activities the users or groups can perform?

ACL

DLP

AUP

A

ACL

File systems such as NTFS, and security devices such as firewalls, can track security in access control lists (ACLs). ACLs can hold permissions for local users and groups, and each entry in the ACL can also specify what type of access is given. This allows a great deal of flexibility in setting up a network

22
Q

Which of the following statements are true regarding file attributes on a Windows 7 workstation? (Choose two.)

File attributes are available only on NTFS volumes.

Only members of the Administrators group can change file attributes.

The attrib command modifies file attributes.

Compression is enabled as a file attribute.

A

The attrib command modifies file attributes.

Compression is enabled as a file attribute.

The four common file attributes are Read-only, Archive, System, and Hidden (remember the acronym RASH). They can be implemented on FAT32 or NTFS volumes and changed by anyone with proper access. On NTFS volumes, you can also compress or encrypt files as part of Advanced attributes. At a command prompt, the attrib command is used to change attributes. In Windows, right-click the file, choose Properties, and look for Attributes on the General tab

23
Q

Several workstations on your network have not had their operating systems updated in more than a year, and your antivirus software is also out-of-date. What type of security threat does this represent?

Noncompliant systems

Zombie/botnet

Zero-day attack

A

Noncompliant systems

The systems are not up-to-date and therefore are more vulnerable to attacks. These systems are considered noncompliant systems. It’s a violation of security best practices to fail to keep all software on your network up-to-date