Security Flashcards
Which term is used in reference to the process of identifying an individual?
Authentication
Which term is used in reference to the process in which a user is identified via a username and password?
Authentication
Which term is used in reference to the process of giving individual access to a system or resource?
Authorization
Which term is used in reference to the process of keeping track of a users activity?
Accounting
Which term is used in reference to the process that prevents someone from denying that she accessed a resource?
Nonrepudiation
Which of the following is a secret numeric password used for authentication?
Pin
Why type of electronic document contains a public key?
Digital certificate
Which item is roughly the size of a credit card and allows access to a network and its resources?
Smart card
Which type of authentication method identifies and recognizes people based on physical traits such as fingerprints ?
Biometrics
Which authentication type is the default for active directory ?
Kerberos
Which directory service is used with windows domains?
Active directory
Which type of server runs active directory ?
Domain controller
When you access permissions to a folder, you should first grant permissions to _____ rather than users.
Groups
When you create a local user on a computer running in Windows 7, where is the user account stored?
SAM
Which type of group can be granted rights and permissions?
Security
Which of the following authorizes a user to perform certain actions in Windows, such as logging on or performing a backup?
Right
When you grant access to print to a printer, which of the following are you granting?
Permission
In which of the following locations are users and permissions stored for an NFTS folder?
Registry
Which type of permissions are assigned directly to a file or folder?
Explicit
Which of the following is the process of converting data into a format that cannot be read by another user?
Encryption
Which authentication method sends the username and password in plain text?
PAP
In Windows, which of the following is used to enable auditing?
NTCS permissions
By default, the _____ group has full access to all resources within a domain.
Domain admins
_______ allows you to log on once and access multiple related by different systems without having to log on again
Single sign on (SSO)
Which of the following is the most common form of authentication?
Password
Which of the following is true of using passwords ?
You should create a strong password
Which of the following best describes a password that is at least seven characters long and uses three of the following categories (uppercase, lowercase, numbers, and special characters)?
Complex password
Which of the following is used to define the length of a password in Windows ?
Group policies
Which of the following is not a complex password?
John!taylor
Which settings are used to keep track of incorrect login attempts and lock the account if too many attempts are detected within a certain set time?
Account lockout
Which setting is used to prevent users from reusing the same the same password over and over?
Password history
Which setting forces users to change their passwords?
Maximum password age
Which type of attack tries to guess passwords by trying common words?
Dictionary attack
Which type of attack tried to guess passwords by every combination of characters?
Brute-force attack
Which malicious software captures every keystone and sends it to a hacker?
Keylogger
Which type of software can you use to view usernames and passwords broadcasted over the network?
Sniffer
Which of the following is the generally accepted minimum password length?
8
Which of the following are the only passwords that should not expire?
Service accounts
Which of the following should users do not do when dealing with passwords?
Write down your password in a piece of paper and keep it near your computer
Do not use names of children and pets
Do not give your password to your co-workers
Describe what might happen if you require passwords to be too long
User will try to circumvent the password
What limits how fast a password for an encrypted file is cracked?
The speed of your computer, particularly your processor