Workstation Security Flashcards
The two factors that are considered important for creating strong passwords are: [2]
- Password length
- Password complexity
A strong password that meets the password complexity requirement should contain:
A combination of characters from at least 3 character groups
What would be the best recommendation for a minimum password length?
8
Which of the following password best practices would mitigate the security risk posed by temporary workers?
Password expiration
Screensaver password requirement falls into the category of password best practices. A password-protected screensaver allows to block access of unauthorized persons to a user’s workstation in situations where the user is forced to leave their desk.
True
BIOS/UEFI passwords improve the security of a workstation. These low-level passwords may, for example, prevent unauthorized users to proceed when the computer is powered on, or restrict the scope of changes a user can make in the BIOS/UEFI interface. A type of BIOS/UEFI password with the highest level of permissions is known as supervisor or administrator password; the other type of password is user password.
True
Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused?
Password history setting
Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password?
Minimum password age setting
Which of the following password policy settings prevents attackers using cracked passwords from gaining permanent access to a Windows workstation?
Maximum password age setting
The category of account management security best practices includes the practice of restricting user administrative privileges to operating systems and applications based on user duties. Operating systems simplify this process by introducing the concept of user groups equipped with different types of permissions which allow system administrators to simultaneously manage permissions of multiple user accounts based on group membership.
true
Which of the following account management security measures narrows down a user’s computer access to specified hours?
Login time restrictions
Because the Guest account in MS Windows allows a user to log on to a network, browse the Internet, and shut down the computer, it is recommended to keep it disabled when it isn’t being used.
true
Which of the following account management security solutions provide countermeasures against brute-force attacks? [2]
- Timeout period between login attempts
- Failed attempts lockout
Implementing a computer screen lock is one of the account management security best practices. The screen lock can be used as a countermeasure against brute-force attacks as it can be set to block computer access after a specified number of failed login attempts.
True
The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (e.g. routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.
True