Security: Compare and contrast common prevention methods Flashcards
Which password policy setting allows you to configure how many new passwords must be created before an old one can be reused?
Password history
When you log in remotely, you must provide a username, password, and smart card. How many factors of authentication is this?
Two factor
Although three items are presented, two items are something you know, and one is something you have
What is a T-bar lock used for?
Securing a laptop to a physical object such as a desk
______ allows users to freely access all systems to which their account has been granted access after the initial authentication
Single sign on
What method is the most secure for distributing passwords to employees?
a. issue the same password to all users, upon logon, force users to change their password
b. send an e-mail to each user that contains their password
c. instruct users to report to their IT department with proper identification for password setup
d. instruct users to request passwords via email
c. instruct users to report to the IT department with proper identification for password setup
A ______ is a physical token that is a one time password issued by a security device. The token is used to access network resources
RSA token
A _____ is a setup with two doors and a small room between them.
The first door requires authentication to access the small room.
The second verification will occur to allow the user through the second door, which can only be opened once the first door is closed
Mantrap
After determining the scope of a user’s job, what is the next step in implementing the principle of least privilege?
Determine the minimum set of privileges needed to perform the user’s job
What is the aim of security awareness training?
To ensure all employees understand security responsibilities
This is the best way to prevent social engineering attacks
_____ checks the identify of both ends of the connection, what authentication method does this?
Mutual authentication, sometimes known as two way authentication
What two methods are used to monitor access control violations?
- Audit logs
- Intrusion detection system
What is one of the highest levels of physical security?
Biometrics
A(n) _______ uses devices such as smart cards or bio-metrics to provide access to authorized persons and prevent unauthorized access to a room
Access control system
What is a smart card?
A hardware device that has an embedded microchip that contains authentication or security information
To provide authentication on a network that contains two servers, what should be implemented?
Usernames with strong passwords