Test 3 Flashcards

1
Q

What are the special “folders” that we create within Active Directory users and computers actually called?

A

Organizational Units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can be applied to the special “folders” within Active Directory users and computers to help control things like password policies and resource access rights?

A

Group Policy Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the full name for Microsoft’s patch management solution that is baked into Windows Server?

A

Windows Server Update Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What web server component gets installed along with Microsoft’s baked in patch management role?

A

IIS [Internet Information Services]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What command did we run to “push out” changes that we made to Active Directory policies?

A

gpupdate / force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Making sure those who should be able to access the data they need is known as this part of the CIA triangle…

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do each of the CIA letters stand for in the CIA triangle?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data integrity?

A

Making sure data has not been tampered with or erroneously altered; either purposefully or accidentally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the second A in the AAA of infosec and is the second step of what happens when you log into a machine

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is the type of “ticket” that windows Active Directory servers issue to a user when they authenticate; it is what is used to authorize access to devices and data

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a user enters in their username and password, it is this first A of the AAA of infosec

A

Authenication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This windows server role allows us to manage all phases of authentication, including password policies

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If I download a list of “known passwords” to use in a password attack, that list would be known as what?

A

Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give me the two password settings that can prevent a user from re-using the same password

A

Minimum password age and password history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password “strength” is a measurement of these two variables

A

Length and complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The material that is contained in most UPS batteries…

A

Lead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The main vertical structures of a rack that support everything else are known as these; they come in 2 or 4 varieties…

A

Posts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

These are the horizontal metal pieces that the servers and other rack mountable devices actually attach to…

A

Rails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

These are the numbers that are written in the vertical structure pieces of a rack

A

Rack units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is the typical width of server racks; in fact, they will actually be referred to as ___ racks

A

19 inches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the name of the approach you should take to patch management?

A

One, some, many

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does mitigation mean?

A

Ways to reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Software that tells a piece of hardware how it is to operate and requires a special process known as flashing to update it is known as…

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A Microsoft update that is securing against a vulnerability that could be used to spread an internet work would be given this rating…

A

Critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A vulnerability that, while not allowing the creation of a worm, may lead to the compromise of the CIA triangle would be given this Microsoft severity rating…

26
Q

Software that is no longer being supported is known.L to have reached this…

A

EOL [End of Life]

27
Q

When you require an extra step for authentication beyond just the user’s password… a biometric could be one

A

Multifactor

28
Q

A vulnerability whose exploitation is protected against by default configuration and auditing would probably be given this Microsoft severity rating

29
Q

These oft overlooked devices can be used as “bastion hosts” to launch further attacks against a network; please do make sure to patch and secure them…

30
Q

The “new” type of surgical ion that we talked about in class. It may allow us to move beyond passwords, but it is currently struggling with vendor lock in issues

31
Q

Giving users ONLY the permissions they need to get their job done is known as this technology concept…

A

Least privilege

32
Q

To force a specific Lock Screen, you would need to configure a setting under this main section of a GPO

A

Computer settings

33
Q

When setting permissions on the security tab in windows, yoh are said to be setting these filesystem permissions

34
Q

If I remove your ability to change your screensaver via group policy, it can be said that I remove a user ____ from your account

35
Q

Name the only time that an allow permission can override a deny permission with the appropriate terminology

A

When the deny is IMPLICIT and the allow is EXPLICIT

36
Q

What a backup gets everything on a machine it is known as this type of backup…

37
Q

This type of backup backs up just files that have changed since the last backup; no matter what type of backup the previous one was

A

Incremental

38
Q

Name the two storage appliance types that are anagrams and often use technologies like RAID and ISCSI to achieve a large amount of storage that can be network accessible for things like backup or running virtual machines from…

A

SAN or NAS

39
Q

This type of backup will allow you to restore to a machine with a very similar hardware layout; in case a major component of your system dies

A

Bare metal

40
Q

This Microsoft technology exposes a point-in-time snapshot of a drive so that things that are normally locked [like open files or running databases] can be backed up

A

Shadow copies

41
Q

This technology is NOT a form of backup in itself, but might be used as a place to store backup files if configured with an appropriate level to achieve redundancy to provide fault tolerance

42
Q

This type of backup gets everything that has been modified since the last full backup; no matter how many other types of backups have been run in between

A

Differential

43
Q

This was a previous gold standard for large amounts of long term storage and is often still used by companies today for offsite archival purposes

A

Magnetic tape

44
Q

If you are backing up “to the cloud”, then tech/business types would probably refer to it as this type of backup

45
Q

What is the 3,2,1 rule of backup?

A

3 copies of any important file, stored on 2 different types of storage media, and 1 copy should be stored off site

46
Q

What f do it’s GPO stand for?

A

Group Policy Object?

47
Q

Setting this password policy will force a user to have to change their password if it is older than the setting

A

Max password age

48
Q

This is the name of the one “default” GPO that exists when you first setup Active Directory and applied across your entire domain

A

Default Domain Policy

49
Q

This password setting includes that the user cannot use more than 2 consecutive characters from their first/last name or username

A

Password must meet complexity requirements

50
Q

These are the two password policies you can set in a GPO that work together to thwart brute force and/or dictionary attacks

A

Lockout threshold and lockout duration

51
Q

This is an exploit for which there currently is no patch available from the vendor

52
Q

These items that add functionality to your web browser often have vulnerabilities that are found within them abd should be patched regularly

A

Plug-ins or extensions

53
Q

If I go public with proof of concept code without letting the vendor of the vulnerable program I just exploited know, I have practiced this

A

Unethical disclosure

54
Q

If I prevent machines at my company from being exploited by disabling 16-but software support until Microsoft can release a patch, I have practiced one of these; 2 possible answers

A

Mitigating factors or workaround

55
Q

This AV technology tries to identify threats which it does not have specific definitions or signature files for by suspect actions a piece of malware might be taking; like writing to kernel memory

A

Heuristics

56
Q

This backup technology shrinks data that is stored in a storage medium down to a smaller size for storage/transmission in one of several ways

A

Compression

57
Q

This backup technology aims to prevent storing multiple copies of the same file in backup sets to reduce overall storage needs

A

Deduplication

58
Q

If you want to keep a new folder you just created from getting permissions from the folder that contains it then you need to do this…

A

Disable inheritance

59
Q

If a user changes positions at you organization several times and never has their old permissions removed, they are getting these; no fault of their own

A

Creeping privileges

60
Q

Microsoft has rebranded service packs to these new forms of a patch that contains all updates that have been released up until a certain point of time

A

Feature updates