Security: Summarize various security measures and their purposes Flashcards

CompTIA A+ Core 2 Exam Criteria

1
Q

What aspects of the Physical Security Measures do you need to consider?

A

Lighting – To have clear visual of faces

Bollards – Fortify surrounding premises, Prevent smash and grab.

Cameras – Visual aspects of security

Guards – to control and monitor (entry control rosters) - prevent social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Another physical consideration are Access Control Vestibules. What does this do?

A

Also known as Man-traps: Will need to use smart card, pin, finger scan or fob entry.

This way of access have two way function where you need to go through one door and must be closed to open the next door which usually has a physical feature to open it. This prevents people from tail gating on unauthorized personnel’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the important consideration you need to implement in a server closet?

A

needs camera, locks on server rack, climate control systems and fire supression systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the CIA triad stand for?

A

Confidentiality, Integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What physical locks can you implement?

A

Cable Locks / PC locks / Kensington lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can we prevent shoulder surfing?

A

Screen filter (dark screen) prevent shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three types of Logical Security?

A

Administrative, Logical (or technical), and Physical. Administrative controls include policies, procedures, rules, standards, regulations, and frameworks. Physical security controls include doors, locks, fences, lighting, cameras, etc. Logical controls are typically software-based and are often found in endpoints, servers, networking devices, and security appliances such as firewalls, proxy servers, intrusion detection and prevention systems, and SIEM (Security information and event management) systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical Security for staff: Key Fob?

A

A key fob is a tiny remote control with an RFID chip and an antenna inside. It uses radio frequencies to communicate with another RFID tag inside a reader device, which is attached to a locking system. Each key fob chip is designed to transmit specific RFID tag information that matches what the reader device has been programmed to accept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Security for staff: Smart Cards

A

A smart card is a physical card that has an embedded integrated chip that acts as a security token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical Security for staff: Biometrics

A

Retina scanner
Fingerprint scanner
Palmprint scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical Security for staff: What is a magnetometers?

A

Metal Detectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Principal of least Priveldge?

A

Principle of Least Privilege is the foundation for all access control systems and methods. The principle of least privilege requires users, devices, and applications to be given only the minimum level of privileges that are necessary to complete the task. The least privilege does not apply only to human users but also to systems and applications.

There is a closely related security control called Need to Know. In high security operations, especially in military and government systems, users or subjects are given clearance. Resources or objects are given a classification. Clearance, classification, and need to know are used to assign privileges in this type of environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you apply privileges to a work Windows Workgroup?

A

Privileges are assigned using Local Users and Groups. This is suitable for small network operations but can be difficult to manage. Each user needs to be given permission on every system they have access to. There is no central administrative console for the configuration of all systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you apply privileges to a Windows Domain?

A

In a Windows Domain, permissions are handled centrally on a Domain Controller server, using Active Directory and Group Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where do I go to configure policies in a Windows Group?

A

Control Panel> Users Account> Change account type:

In the User Accounts - Users tab, you can add or remove a user’s access to the device. You can also change the admin password by clicking the Reset Password button.

In the User Accounts - Advanced tab, you can manage passwords, as well as perform advanced user management tasks using Local Users and Groups. You can also enable secure sign-in by ticking the checkbox next to the Require users to press Ctrl+Alt+Delete field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can I get into Local Security Policy?

A

Control Panel (small icon) > Administrative tools (Windows Tool in Windows 11) > Local Security Policy> Expand Account polices on the left plane > Click Password Policies.

Other Measures:

Select Account Lockout Policy on the left pane.

The following Policies can be configured:

Account lockout duration

Account lockout threshold

Reset account lockout counter after

Note:
In a Windows Workgroup, these changes need to be made to each system individually and consequently can be difficult to configure and manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where can I I find the Directory and Group Policy?

A

Server Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Where can I find the Active Directory Users and Computers? (domain user)

A

Control Panel > Administrative tools (or windows tool) > Click Active Directory Users and Computers.

In the Active Directory Users and Computers window, notice that you have two users on the right pane Administrator - User and Guest - User.

Everything else is standard Windows Security Group. Active Directory works with Group Policy as follows: Permissions are assigned to Groups, then users are added to one or more Groups. The User inherits their permissions from the Groups they belong to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can I assign a new user to a a domain group?

A

Control Panel: Back on the Administrative Tools window, double-click Group Policy Management.

In the Group Policy Management window, select Default Domain Policy on the left pane.

Select the Settings tab on the Default Domain Policy pane on the right.

Expand the Security Settings Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the Access Control List? (ACL)

A

An Access Control List is a list of permissions associated with an object or resource. The ACL specifies which users or system processes are allowed to access the resource. For instance, if Amy has permissions to read/write and Bob only has permissions to read, Amy’s permissions are higher than Bob’s.

Access control lists are used in many places on a network. One of the most common is a network firewall. In firewalls, access control lists are commonly known as firewall rules. Firewall rules are written in order and are applied from the first rule to the last. If the first rule matches the traffic, all the other rules will be overridden. The rules will specifically ALLOW connections based on attributes such as Source IP address, Destination IP address, Source Port Number, and Destination Port Number. The final rule is the DENY REST rule. It blocks all traffic that is not specifically allowed in earlier rules.

Other resources that may use access control lists include file systems (read, write, modify, execute, delete), Active Directory and LDAP directories (user and group permissions, role-based access controls (RBAC)), network devices such as firewalls, routers, and switches (rules), and relational databases (permissions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can I change windows inbound outbound rules?

A

Control Panel> System and Sec> Windows Defender Firewall> Click advanced settings>

In the Windows Defender Firewall with Advanced Security window, select Inbound Rules on the left pane. > Select New Rule in the Actions pane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is MFA?

A

In the beginning, if you were logging in to a system, resource, or network, all you needed was a user ID and password. Now, due to the threat of passwords being hacked using methods such as Brute Force and Dictionary attacks, a password on its own is not a very good form of security. Passwords need to be at least 15 characters to be able to withstand automated password cracking. But if you give your password away as the result of phishing or social engineering exploits, the length won’t matter.

Current solutions to this problem include “passwordless” and multifactor authentication. Multifactor authentication requires two or more different types of authentication from the list below. Two authentication methods from the same category are not considered to be valid. For instance, a password and a PIN number are both from the authentication type of something you know.

Something You know, Something You have, Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the requirements factors for 2FA or MFA?

A

Knowledge-based - Something you know, such as a password, PIN, or challenge questions and answers.

Possession-based or physical device - Something you have, such as an ID card or badge, smart card, digital certificate, phone app, or RSA token or fob.

Biometrics or bodily characteristics - Something you are, such as a fingerprint, palm print, hand geometry, retina scan, iris scan, facial scan, or voice recognition.

Location - Somewhere you are, as determined by GPS devices, including a smartphone, IP address, MAC address, and machine name or Fully Qualified Domain Name (FQDN).

Behavioral - Something you do, such as keyboard typing cadence, mouse dynamics, EUBA or end-user behavior analytics, or even a written signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the secure and Insecure ports for POP (Post Office Protocol)

A

Secure port: 995 Insecure: 110

23
Q

What is the secure and Insecure ports for IMAP (Internet Message Access Protocol)

A

Secure: 993 Insecure 143

24
Q

What is the secure and Insecure ports for SMTP (Simple Mail Transfer Protocol)

A

Secure: 587 (STARTTLS) and 465
Insecure: 587, 25

25
Q

What is the secure and Insecure ports for HTTP (Hypertext Transfer Protocol)?

A

Secure: 443 Insecure: 80

26
Q

What is S/MIME?

A

Secure/Multipurpose Internet Mail Extensions (S/MIME):

S/MIME is a secure encryption protocol used to send emails with end-to-end encryption. It is supported by most email services and applications. S/MIME requires the use of Digital Certificates and Public Key Infrastructure (PKI). The contents of the email are encrypted, but the metadata contained in the email headers is sent in plain text.

You can do this on a outlook (more options)

27
Q

How can you configure accounts to use secure ports and protocols?

A

Mail> Add an Account windows > Select Advance Setup> Select Internet Mail>

  • In the Internet email account window, you can enter your Email address, User name, Password and Account name.
  • You have to follow the following fields:
  • The Incoming email server will be in the following format: mail.mydomain.com, pop.mydomain.com, or imap.mydomain.com.
  • For the Account type, you can select POP3 or IMAP4 from the drop-down menu.
  • The Outgoing mail server will be in the following format: mail.mydomain.com or smtp.mydomain.com.

“The four fields have checkboxes enabled by default. The first two fields ensure there’s proper authentication when sending emails. “

  • Requires SSL for incoming and outgoing emails; when enabled, will use encryption for the email account.
28
Q

What is PGP and OpenPGP?

A

PGP and its more commonly used open-source variation OpenPGP is an encryption protocol used for sending highly secure end-to-end-encrypted (E2EE) emails. It’s popular for both email encryption and file encryption.

29
Q

Email Sender Identification and Authentication Methods: What is SPF?

A

Sender Policy Framework (SPF) is an authentication method used in emails to prevent threat actors from replicating a sender’s email address. This was designed to stop spammers from sending messages that spoofed somebody else’s domain and block phishing and malware attachments.

30
Q

Email Sender Identification and Authentication Methods: What is DKIM?

A

DomainKeys Identified Mail (DKIM) is another authentication method to block spoofed sender addresses. DKIM allows an email server to ensure the sender is legitimate. This helps DKIM to block spam and phishing emails. DKIM signs an email with a digital signature, which can be verified and authenticated, to prevent spoofing.

31
Q

Email Sender Identification and Authentication Methods: What is DMARC?

A

Domain-Based Message Authentication, Reporting & Conformance (DMARC) is an email authentication protocol that works together with DKIM and SPF. DMARC can only be used when both SPF and DKIM have been correctly configured. DMARC provides analysis and reporting about who is sending emails from a given domain.

32
Q

What is a Hard Token?

A

A Hard Token or hardware token is a physical device used for authentication. They are commonly known as key fobs, security tokens or USB tokens. RSA key fobs are a common example of a hard token.

It may be used as a single form of authentication or as part of a two-factor or multifactor authentication system. As part of MFA, it would be a possession-based or something-you-have authentication method.

There are two main types of hard tokens, synchronous and asynchronous. A synchronous token is synchronized with an authentication server. The token generates a six-digit one-time password (OTP) which needs to be entered into the login screen flow. An asynchronous token uses a series of challenge/response entries to authenticate.

33
Q

What is Soft Token and how to use it?

A

A Soft Token or software token is similar to a hard token. Typically, a hard token is associated with a specific hardware device. A soft token is a software application that can be installed on different devices such as smartphones, tablets, laptops, or other computer systems. These software applications generate a synchronous six-digit OTP code that has to be entered in the logon screen flow within a short period of time, usually 30 or 60 seconds.

34
Q

What is a SMS and the purpose of it in regards to security Parameters?

A

Another way to deliver a one-time password (OTP) is via Short Message Service (SMS) or smartphone text message. This is a fairly common method, even though they are not considered very secure. SMS does not use an encrypted channel and can be intercepted as plaintext. As such, it is susceptible to SIM cloning attacks.

35
Q

What is a Voice call or call back and the purpose of it in regards to security Parameters?

A

Voice call or call-back has been an authentication method used as far back as with early RADIUS authentication servers. A user attempting to dial into the company’s analog dial-up modem pool and connect to the network is often authenticated and then waits for the system to call back. Then an analog dial-up connection is made.

This system is still used to send OTP codes to users. To complete the authentication, the system calls you back with an automated message that includes the OTP.

A telephone call can also be used to verify the sender of an email and any contents, such as file attachments. This can be used to avoid falling for suspicious phishing emails.

A telephone call can also be used to verify the sender of an email and any contents, such as file attachments. This can be used to avoid falling for suspicious phishing emails. Some banks make a telephone call to confirm wire transfers or EFT requests before committing to the funds being transferred.

36
Q

What is a Authenticator Application?

A

It is a specific type of soft token that is available for smartphone platforms and includes smartphone apps such as Google Authenticator, Authy, LastPass Authenticator, or Microsoft Authenticator. These software applications also generate a synchronous six-digit OTP code that has to be entered in the logon screen flow within a short period of time, usually 30 or 60 seconds.

37
Q

Why do we utilize MDM (Mobile Device Management)

A

Most organizations now allow the use of mobile phones to share their data. However, there is always a risk of data being stolen or the mobile phone being compromised. MDM is a feature used in an enterprise network to keep a mobile device environment secure.

38
Q

What are the four methods used on MDM?

A

Bring Your Own Device (BYOD) - Organizations might allow you to bring your own device for official use. However, organizations need to ensure that any corporate data on the mobile phone is secure. To safeguard the data, mobile phones must be encrypted.

Choose Your Own Device (CYOD) - This method allows employees to choose a device. The employee can either purchase the device from the organization or pay rent. However, the organization has complete control over the mobile device.

Corporate-Owned, Personally Enabled (COPE) - The organization provides the mobile device to the user. However, as a user, you are only allowed to install pre-approved apps.

Corporate-Owned, Business Only (COBO) - The organization provides, controls, and manages the devices. The applications and the data belong to the organization.

39
Q

What functions can you utilize having a MDM device?

A

you can block rooting, jailbreaking, or any other feature you do not want the employees to use. MDM also allows you to restrict the use of any application other than approved applications from your app store.

If the mobile device containing corporate data is lost, you can use the Remote Wipe feature to completely wipe the mobile storage and erase sensitive data and its configuration. As a precautionary measure, you can enable full device encryption. This will ensure that the data remains secure and confidential, even if it is stolen.

40
Q

What is Geofencing with MDM?

A

MDM can be used to enable geofencing, which alerts the administrator if a user leaves the defined perimeter. Alongside this, you can also configure asset tracking. Even if the SIM is changed, you will be able to locate the device.

41
Q

What is the active directory used for?

A

Active Directory is a network management and maintenance technology that makes managing and maintaining networks easier. Instead of going to each computer and manually configuring it, Active Directory can be used to remotely configure it. Users and computers on the network will be assigned to groups, which will subsequently be subject to rules and permissions. Maintaining privileges and security becomes considerably more efficient because of this.

42
Q

What are the three structure of an active directory?

A

Forest Tree’s and Domains.

43
Q

What is the active directory “Forest” consist of?

A

The Forest is at the top level in the active directory structure. Forests are separate from one another. They each have their own boundaries for security and have a single database and global address for each. Forests can become very large depending on the organization. This is where Active Directory is required. Medium to large companies lean heavily on Active Directory to help manage their network and security.

44
Q

What is the active directory “Tree” consist of?

A

A Tree is a collection of Domains that have formed a trust relationship with each other. If domains are situated in a tree, they can communicate with each other because of the established trust. Several trees, together with formed trust, are known as a forest.

45
Q

What is the active directory “Domain” consist of?

A

A Domain is a collection of users, computers, and other items that are controlled by the Active Directory administrators. They are grouped together regardless of their physical position. At least one Domain Controller is required for each domain. The domain controller is the server that stores all of the active directory’s setups and settings. If the server is not a domain controller, it is a member server.

46
Q

What are security groups?

A

In an Active Directory, there are two styles of groups. Security groups allow administrators to apply rights and permissions, control access to shares and apply overall controls to the system.

47
Q

What is a Distribution group?

A

Distribution Groups are only meant for communication purposes. These are email lists that allow communication for the users in the active directory. Distribution Groups can’t affect a policy.

48
Q

How to set up a Security Group?

A

Server Manager > Tools Menu> Active Directory Users and Computers >

In the Active Directory Users and Computers window, right-click anywhere on a blank space in the right details pane and select New > Group.

In the New Object - Group dialog box, type the following for the Group name field:

Folder Redirect > Click OK

Back on the Active Directory Users and Computers window, right-click anywhere on a blank space in the right details pane and select New > User.

In the New Object - User dialog box, type the following for the First name and User logon name fields: testuser > Click next

Type the following for the Password and Confirm password fields: Passw0rd > Click finish

Back on the Active Directory Users and Computers window, right-click Folder Redirect and select Properties.

From the Folder Redirect Properties dialog box, select the Members tab > In the Members tab, click Add.

In the Select Users, Contacts, Computers, Service Accounts, or Groups dialog box, type the following for the Enter the object names to select field: testuser > Click Check Names. > User is searched and found Click OK

testuser is now added to the Members.

Click OK.

49
Q

How to set up GPO for the Security group?

A

Server Management> Tools> Group Policy Management> Right click on group Poliy Objects and Select New.

In the New GPO dialog box, type the following for the Name field: Folder Redicrection> Click Ok

Back on the Group Policy Management window, expand the Group Policy Objects node. > Right-click on Folder Redirection and select Edit

In the Group Policy Management Editor window, expand the following nodes:

User Configuration > Policies > Administrative Templates > System > Select Folder Redirection.

On the Folder Redirection pane, right-click Do not automatically make all redirected folders available offline and select Edit.

In the Do not automatically make all redirected folders available offline window, select the Disabled option. >Click the Next Setting button.

In the Do not automatically make specific redirected folders available offline window, select the Enabled option.

In the Options section, enable the following checkboxes:

Pictures
Music
Videos

Click Next Setting

In the Enable optimized move of contents in Offline Files cache on Folder Redirection server path change window, select the Disabled option. > Click Next Setting.

In the Use localized subfolders names when redirecting Start Menu and My Documents window, select the Enabled option. > Click Next Setting

In the Redirect folders on primary computers only window, select the Disabled option. >Click OK.

Close the Group Policy Management Editor window.

Back on the Group Policy Management window, select Folder Redirection.

On the Folder Redirection pane, click Add under the Security Filtering section.

In the Select User, Computer, or Group dialog box, type the following for the Enter the object name to select field: Folder Redirect > Click Check Names.

Folder Redirect is searched for and found. > Click OK.

The Folder Redirect group has now been added to the Security filtering section, and the rules that were enabled will be applied to testuser since they are a Member.

Right-click Practicelabs.com and select Link an Existing GPO.

From the Select GPO window, select Folder Redirection and click OK.

50
Q

What is the purpose of folder redirection?

A

Folder Redirection enables users and administrators to redirect the path of a known folder to a new location, manually or by using Group Policy. The new location can be a folder on the local computer or a directory on a file share

51
Q

What is the purpose of the “Home folder”

A

The Home folder is created for each user upon the creation of their account. It will contain user-created files and have the following folders created for the user: 3D Objects, Contacts, Desktop, Documents, Downloads, Favorites, Links, Music, OneDrive, Pictures, Saved Games, Searches, and Videos. It is also an assignable folder which means that administrators can create this folder on a Server and link to the user profile. Hence, when users log in throughout the domain, they will have a consistent experience across different computers.

52
Q

How to create a home folder?

A

In the File Explorer window, select Local Disk (C:) on the left pane.

Right-click anywhere on the details pane and select New > Folder.

Right-click on the New folder and select Rename.

Rename the folder to: Home folder testuser

Right-click on the Home folder testuser folder and select Properties.

On the Home folder testuser Properties dialog box, select the Sharing tab.

From the Sharing tab, click Advanced Sharing

In the Advanced Sharing dialog box, enable the Share this folder checkbox.

Select Permissions in the Advanced Sharing dialog box.

Click Add in the Permissions for Home folder test user dialog box.

On the Select Users, Computers, Service Accounts, or Groups dialog box, enter the following in the Enter the object to select section and click Check Names : testuser > Click OK

On the Permissions for Home folder test user window, ensure testuser is selected and enable the Full Control checkbox. Click OK

Click OK on the Advanced Sharing dialog box.

In the Home folder testuser Properties window, notice the folder is now shared. Highlight the Network Path and right-click on it.

Select Copy.

Click Close on the Home Folder testuser Properties window.

Restore the Active Directory Users and Computers window from the Taskbar.

Right click testuser and select Properties.

In the testuser Properties dialog box, select the Profile tab.

In the Home folder section, next to the Connect field, right-click and Paste the path copied earlier Click OK on the Active Directory Domain Services pop-up window.

53
Q

What is an Active Directory Logon Scripts?

A

Logon scripts can be used for several purposes, such as including the mapping of network drives to users and computers, installing applications, setting up printers, creating log files, and many other tasks. Once the script is written, it will need to be saved in a batch file.

54
Q

How can you update the group Policy?

A

When rules are created in the active directory, they do not take effect until the next update is run. If an administrator wants to enact the rules immediately, they can access the command line or Windows PowerShell and force the update to occur immediately.

Windows PowerShell (Admin) > Type gpupdate /force, Press Enter >
Administrator: Windows PowerShell window, type the following command and press Enter: gpresult /R

The result from the command shows that the GPO has been successfully applied to the user account.

55
Q

What is a purpose of a Batch File?

A

A batch file is a file that is used to automate a process. The instructions will be sequentially written in a shell script and run with administrative privileges. Some common uses for batch files include backing up files, process logs, diagnostics, and other common administrative time-consuming tasks. To create a batch file, a text editor will be accessed, and a script will be written. After writing the script, it will be saved in batch file format.

56
Q
A