Security: configure a workstation to meet best practices for security. Flashcards
CompTIA A+ 220-1102 Exam Criteria
What is Data-at-rest encryption?
Encrypting data at rest secures files and documents, ensuring that only those with the key can access them. The files are useless to anyone else. This prevents data leakage, unauthorized access, and physical theft—unless attackers manage to compromise the key management scheme and gain access to the key.
What are the criteria you need to consider when you are applying Password Best Practices?
Requiring strong passwords
Setting password expiry
Changing any default passwords
Password managers
Centralized management and enforcement
Where can we modify the password complexity and Expiration requirements?
LOCAL Security Policy > Account Policies > Password Policies
On the right-details pane, notice the Password must meet complexity requirements Policy is Enabled. > Double-click the Policy.
What is the minimum requirements for password Complexity?
Should not contain parts of the user’s name or user ID
Should at least be 6 characters long
Contains at least three characters from the following categories - uppercase characters, lowercase characters, numbers, and special characters.
What is the minimum requirements for password history?
You can set them to 24 unique passwords until you can recycle them.
What is the minimum requirement of Maximum age of a password?
Here, you can specify the period (in days) a password can be used before it can expire. The passwords can be set to expire for days between 1 and 999. If the number of days is set to 0, the password will never expire. You should set it every 40+ days depending on your company policy.
What is the minimum requirements of Minimum Password Age?
Minimum should be at 1 day.This setting is used to specify the number of days a password should be used before you can change it.
What is the minimum requirements of Password Length?
In this security setting, you can specify the minimum number of characters your password should contain. On standard it should be minimum 8 characters long.
How can you configure Supervisor’s Password?
Will need to configure via UEFI/BIOS (so many options to get into BIOS/UEFI)
the easiest way is via system > Recovery> Advance Start up - Restart now.
Will go to the security tab or Administrator secction once into BIOS > enter the password.
Alternatively, you can use CMD command (run as administrator) > shutdown /r /fw
How to use Failed Attempt Lockout?
Passwords can be cracked with attacks such as the Brute Force attacks. In order to stop someone from repeatedly attempting to guess passwords or using a script, failed attempt lockouts can be used.
Local Security Policy > Account Policies> Account lockout Policies> Double-click on Account lockout threshold Policy.
The Account lockout duration and Reset account lockout counter will be enabled automatically. The timer will be set to 30 minutes by default.
What are the best practices for Securing End-Users Devices and Data?
Enable Screensaver & Screen Locks
Encrypt a Drive with BitLocker
BIOS/UEFI Password Management
Why would we enable Screensaver & Screen Locks?
A major security concern is leaving computers unlocked while a user is away from the system. This is the perfect time for what is known as a lunchtime attack. This attack involves accessing a user’s computer while they are away to access resources they would otherwise not have access to.
Whenever users are away from the system and not using it, the computer should be password protected. Automatic locking of the PC should be set after a few minutes. To manually lock the screen, you can press the Windows button + L together. Screensavers can also be enabled with password protection.
How can you configure a Screensaver & Screen Locks?
Right-click on the Desktop and Select Personalize from the context menu that appears.
In the Settings - Personalization pane > Scroll down and select Lock screen.
Scroll down and select Screen timeout. > Click the Allow my screen to turn off link. > Click Screen and Sleep
Look through the options
what is the purpose of Encrypting a drive with Bitlocker?
Data security should be a top priority for any organization. Customers’ data is valuable to businesses, and it must be safeguarded. Data types that must be securely stored include Personally Identifiable Information (PII), Personal Health Information (PHI), and Payment Card Industry (PCI). Government standards are enforced to ensure that this type of data is secure to a certain level.
What does PII entail?
- PII - This information can be broken down into 2 different categories
Sensitive PII
Full name
Social Security number
Driver’s license number
Address
Credit card information
Passport information
Non-sensitive PII
Race
Gender
ZIP code
Date of birth
Birthplace
Religion