Workstation Security Flashcards

1
Q

The two factors that are considered important for creating strong passwords are: [2]

A
  • Password length

- Password complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A strong password that meets the password complexity requirement should contain:

A

A combination of characters from at least 3 character groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What would be the best recommendation for a minimum password length?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following password best practices would mitigate the security risk posed by temporary workers?

A

Password expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Screensaver password requirement falls into the category of password best practices. A password-protected screensaver allows to block access of unauthorized persons to a user’s workstation in situations where the user is forced to leave their desk.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BIOS/UEFI passwords improve the security of a workstation. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on, or restrict the scope of changes a user can make in the BIOS/UEFI interface. A type of BIOS/UEFI password with the highest level of permissions is known as supervisor or administrator password; the other type of password is user password.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused?

A

Password history setting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?

A

Minimum password age setting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?

A

Maximum password age setting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The category of account management security best practices includes the practice of restricting user administrative privileges to operating systems and applications based on user duties. Operating systems simplify this process by introducing the concept of user groups equipped with different types of permissions which allow system administrators to simultaneously manage permissions of multiple user accounts based on group membership.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following account management security measures narrows down a user’s computer access to specified hours?

A

Login time restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Because the Guest account in MS Windows allows a user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn’t being used.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following account management security solutions provide countermeasures against brute-force attacks? [2]

A
  • Timeout period between login attempts

- Failed attempts lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Implementing a computer screen lock is one of the account management security best practices. The screen lock can be used as a countermeasure against brute-force attacks as it can be set to block computer access after a specified number of failed login attempts.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (e.g. routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active Directory Users and Computers (ADUC) is a Microsoft Management Console (MMC) snap-in included in most Windows Server OSs. The Active Directory Users and Computers snap-in allows system administrators to manage resources in the Active Directory (AD) environment (e.g. to create, delete, disable, unlock accounts, or to reset account passwords). On a Windows Server OS, the Active Directory Users and Computers snap-in resides in:

A

Administrative Tools folder in Windows Control Panel

17
Q

An MS Windows feature enabling automatic execution of code contained on a mounted drive is called AutoRun. Since disabling AutoRun decreases potential security risk related to the propagation of malware, Windows 7/8/8.1/10 have AutoRun disabled by default.

A

True

18
Q

Which of the following data encryption tools can be used to secure a Windows workstation? [2]

A
  • BitLocker (drive-level encryption)

- EFS (file-level encryption)

19
Q

The process of securing a workstation should involve keeping track of available system updates and patches. A single PC running Windows can be updated and patched via the Windows Update service. A similar type of service that enables centralized management and distribution of updates and patches to multiple Windows-based hosts in a corporate environment is known as Windows Server Update Services (WSUS).

A

True