Security Technologies Flashcards

1
Q

User can view the contents of a folder and any subfolders. User can view the contents of the file.

A

Read Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Read permission, plus the user can add files and create new subfolders. Read permission, plus the user can make changes (write) to the file.

A

Write Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Read permission, plus the user can run executable files contained in the folder. This permission is inherited by any subfolders and files. Read permission, plus the user can run a file if it is executable.

A

Read & Execute Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Read permission, plus the user can run executable files contained in the folder. This permission is inherited by subfolders only.

A

List Folder Contents Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Read and Write permissions, plus the user can delete the folder. Read and Write permissions, plus the user can delete the file.

A

Modify Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Read, Write, and Modify permissions and the user can delete all files and subfolders. Read, write, modify, and delete the file.

A

Full Control Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user’s permissions are the sum of the permissions they have been assigned individually and obtained through any groups in which they are a member.

A

effective permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Syntax to modify file or folder attributes

A

attrib.exe

ATTRIB [ + attribute | - attribute ] [pathname] [/S [/D]]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the permission types on Linux?

A

Read (r): User can view the contents of a file.
Write (w): User can write to (modify) the contents of a file or directory.
Execute (x): User can run an executable file and view the contents of a directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In Linux, the person who is responsible for the file.

A

Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Linux, includes members of the file’s group.

A

Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Linux, includes all users who are not in the file or folder’s group or the owner.

A

Others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Syntax for allowing all permissions in Linux

A

drwxrwxrwx.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Component included with many Linux distributions allows more options for setting file and folder permissions

A

Security Enhanced Linux (SELinux)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Default Share permission assigned to the Everyone group

A

Read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Default Share permission assigned to the Administrators group on the local computer

A

Full Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Character at the end of the share name indicates that is a hidden share.

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Permissions assigned to a parent object that flow down and apply to a child object.

A

Inherited permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This command allows you to copy objects while preserving their existing permissions.

A

xcopy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Option that allows the change of permissions to be applied to all sub folders

A

Propagating Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A MMC snap-in (also available in Computer Management) which allows you to centrally manage users and groups on the computer. You can use it to create, rename, or delete users and groups; add users to groups; and set other user settings such as password policies, logon scripts, and folder locations.

A

Local Users and Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A utility which allows you to configure a wide range of security settings for the local computer, including those related to account management, default user rights, network functions, and so on. It works primarily by changing registry settings, but provides a much safer and more focused interface than REGEDIT

A

Local Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A utility which allows you to edit group policies for the entire computer

A

Local Group Policy Editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A database which stores user passwords and performs authentication of local users

A

Security Account Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A Control Panel utility which allows individual users to access their stored user names, passwords, and certificates

A

Credential Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Notifies you when an action will change Windows settings and gives you an option to stop

A

User Account Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A feature that runs in the background to protect critical system files, folders, and registry keys from unplanned alterations

A

Windows Resource Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Three network protocols associated w/ Active Directory?

A

LDAP - resource directory services
Kerberos - SSO authentication through the domain
DNS - mapping the server namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Stores information about all computers, users, and other resources that are available on the domain

A

domain controller

30
Q

Uses the remote share to store all personal folders, desktop contents and appearance, Windows personalization, and application settings.

A

roaming profile account

31
Q

Maps the remote share as a network drive and sets it as the user’s Documents folder.

A

home folder

32
Q

Flexible approach which allows an administrator to decide which folders are stored only on the network and which are copied locally.

A

Folder redirection

33
Q

A single sign-on system that uses the common Internet standard SAML instead of LDAP.

A

ADFS Active Directory Federation Services

34
Q

Provides directory services independent of the Windows domain model.

A

AD LDS Active Directory Lightweight Directory Services

35
Q

Allows the Active Directory network to maintain a public key infrastructure

A

AD CS Active Directory Certificate Services

36
Q

An information rights management service that can encrypt and limit access to specific types of information on the domain, such as emails, Word documents, web pages, and so on

A

AD RMS Active Directory Rights Management Services

37
Q

Allows a user or the operating system to read a file, but not write to it

A

Read-Only (R)

38
Q

Specifies the file should be backed up

A

Archive (A)

39
Q

Indicates the file is a system file and shouldn’t be altered or deleted

A

System (S)

40
Q

Suppresses the display of the file in directory lists

A

Hidden (H)

41
Q

Indicates a folder or sub-folder, differentiating them from files

A

Directory (D)

42
Q

Windows has a search function that indexes all files and directories on a drive to achieve faster search results

A

Not content-indexed (I)

43
Q

Notifies when an action changes Windows settings and gives an option to allow or deny

A

User Account Control

44
Q

A Control Panel utility which allows individual users to access their stored usernames, passwords, and certificates

A

Credential Manager

45
Q

A database containing low-level settings for all aspects of the Windows operating system as well as for some installed applications

A

Windows registry

46
Q

A utility which allows a user to configure a wide range of security settings for the local computer

A

Local Security Policy

47
Q

A database which stores user passwords and performs authentication of local users

A

Security Account Manager

48
Q

What is the purpose of BitLocker in Windows?

A

drive encryption

49
Q

The VPN protocols are managed either by software running on a host or router, or on a specialized hardware appliance known as ________.

A

VPN concentrator

50
Q

Which security appliance intercepts and mediates communications between internal and external hosts on a network?

A

Proxy server

51
Q

Which of the following is used to restrict devices which connect to the network or to detect and block some attacks using spoofed MAC addresses?

A

Port security

52
Q

What command allows you to copy objects while preserving their existing permissions?

A

xcopy

53
Q

Which Windows security feature runs in the background to protect critical system files, folders, and registry keys from unplanned alterations?

A

Windows Resource Protection

54
Q

A switch feature that tracks device MAC addresses connected to each port on a switch, and allows or blocks traffic based on source MAC addresses

A

Port security

55
Q

On Ethernet networks this is another term for port security, but it’s more commonly used for a similar feature on WAPs.

A

MAC filtering

56
Q

Used to classify and protect your organization’s confidential and critical data

A

Data loss prevention (DLP) software

57
Q

A networking device, such as a router, server, firewall, or similar device with Internetworking and data transmission capabilities that sits at the external edge of a secure internal network and requires an external device to identify and authenticate itself before the gateway creates a connection allowing access to internal network resources.

A

A VPN Gateway

58
Q

Communications protocols that provide secure data transmission over an unsecure network. Data is commonly secured using an encryption protocol such as IPsec or a tunneling protocol such as SSL/TLS.

A

Secure transport protocols

59
Q

Initially designed to provide full AAA support for users joining the network over dialup connections. Since then it’s been expanded to use for other point-to-point connections, such as authenticating remote users in a VPN, or by ISPs to authenticate customer connections

A

Remote Authentication Dial-In User Service (RADIUS)

60
Q

A RADIUS system consists of three basic parts:

A

Users, RADIUS Server, NAS

61
Q

RADIUS network protocols for authentication

A

PAP, CHAP, and EAP

62
Q

A proprietary Cisco protocol with some performance and security benefits over RADIUS. Drawbacks include more complex configuration, and incompatibility with some network configurations.

A

TACACS+

63
Q

An open standard with similar improvements to TACACS+, named for being supposedly twice as good as RADIUS

A

Diameter

64
Q

Security Appliances

A
WAF
Network antimalware
Spam filter
Content filter
Proxy server
65
Q

Relays all communication between users and the RADIUS server. It’s the device users directly connect to, like a dial-in server, VPN endpoint, or WAP.

A

Network Access Server (NAS)

66
Q

Used to authenticate PPP sessions and can be used with many VPNs.

A

Password Authentication Protocol (PAP)

Challenge Handshake Authentication Protocol (CHAP)

67
Q

An authentication framework frequently used in wireless networks and point-to-point connections.

A

Extensible Authentication Protocol (EAP)

68
Q

Enables a server to provide standardized and centralized authentication for remote users. It is a mechanism that allows authentication of dial-in and other network connections.

A

Remote Authentication Dial-In User Service (RADIUS)

69
Q

A security protocol that combines digital certificates for authentication with public key data encryption.

A

Secure Sockets Layer (SSL)

70
Q

A communication protocol that enables sending email from a client to a server or between servers.

A

Simple Mail Transfer Protocol (SMTP)

71
Q

A voice over data implementation in which voice signals are transmitted over IP networks.

A

Voice over IP (VoIP)