1102: Chap 7 - Security Flashcards
(34 cards)
1102-Chap7-12: You are configuring a router for a small office network. The network users should be able to access regular and secure websites and send and receive email. Those are the only connections allowed to the Internet. Which security feature should you configure to prevent additional traffic from coming through the router?
MAC filtering
Content filtering
Port forwarding/mapping
Port security/disabling unused ports
Port security/disabling unused ports
1102-Chap7-13: On a Win10 workstation, there are two NTFS volumes. The Managers group has Modify access to the D:\mgmt directory. You move the folder to the D:\keyfiles folder, to which the Managers group has Read Access. What level of permissions will the Managers group have to the new D:\keyfiles\mgmt directory?
Full Control
Modify
Read & Execute
Read
Modify
When you move or copy a folder on the same NTFS volume, it will keep its original permissions. If you copy it or move it to a different volume, it will inherit permissions from its new parent directory
1102-Chap7-19: What does NTFS use to track users and groupd and their level of access to resources?
ACLs
Token
Badges
Control rosters
ACLs
1102-Chap7-20: You have created a user account for a contract employee on a Windows 11 PC. The contractor will be with the company for a month. Which user group should this user’s account be placed in?
Power Users
Administrators
Standard Users
Guests
Guests
Guest have same access rights as Users, except: cannot access log files; Great for temporary workers
1102-Chap7-25: What wireless protocol used in WPA compensates for the weak encryption of WEP?
VLAN
TKIP
VPN
AES
TKIP
Temporal Key Integrity Protocol
WPA Encryption protocol
TKIP - temporal Key Integrity Protocol
WPA2 Encryption protocol
AES - Advanced Encryption Standard
1102-Chap7-30: What concept in Active Directory creates a directory subdivison within which may be placed users, groups, computers and other objects?
User
Domain
Organizational Unit
Home folder
Organizational Unit (OU)
Folder Redirection
AD feature to allow users to log in from other computers. I think it used to be called Windows roaming profiles
1102-Chap7-40: A user on your network reported that they received a phone call from someone in the IT department saying the user needed to reset their password. The caller offered to do it for them if they user could provide the IT worker with their current password. What is this most likely am example of?
The IT department helping the user to reset their password
A spoofing attack
A social engineering attack
A brute-force attack
A social engineering attack
1102-Chap7-42: Several employees at your company have been tailgating to gian access to secure areas. Which of the following security methods is the best choice for stopping this practice?
Door lock
Entry control roster
Access control vestibule
ID Badges
Access control vestibule
1102-Chap7-45: An administrator is transfering confidential files from one Windows Pro workstation to another, using a flash drive. Policy dictates that the files on the flash drive must be encrypted. What technology should be used?
BitLocker
BitLocker To Go
EFS
AES
BitLocker To Go
1102-Chap7-49: Several Workstations on your network have not had their operating systems updated in more than a year, and your anti-virus software is also out of date. What type of security threat does this represent?
Non-compliant system
Zombie/botnet
Brute-force attack
Zero-day attack
Non-compliant system
1102-Chap7-51: UserA is a member of the Dev group and the HR Group. They are trying to access a local resource on an NTFS volume. The HR group has Full Control permission for the payroll folder, and the Dev group has Deny Read permission for the same folder. What is UserA’s effective access to the payroll folder?
Full Control
Read
Write
Deny
Deny
When granting conflicting NTFS permissions, they are generally combined, and the most liberal is granted. The exception is when there is an explicit Deny. That overrides any allowed permissions
1102-Chap7-53: You have assigned a Windows workstation to a workgroup. Which of the following are recommended best practices for maxmizing security rehgarding the Administrator account? (Choose two)
Disable the Administrator account
Rename the Administrator account
Remove the Administrator account from the Administrators group
Require a strong password
Rename the Administrator account
Require a strong password
1102-Chap7-55: Which of the following are advantages of using NTFS permissions over share permissions? (choose two)
NTFS permissions will override share permissions if there is a conflict
NTFS permissions affect users at the local computer, but share permissions do not
NTFS permissions are more restrictive in their access levels than share permissions
NTFS permissions can be set at the file level, but share permissions cannot
NTFS permissions affect users at the local computer, but share permissions do not
NTFS permissions can be set at the file level, but share permissions cannot
1102-Chap7-56: Someone has placed an unauthorized wireless router on your network and configured it to the same SSID as your network. Users can access the network through that router, even though its not supposed to be there. What type of security threat could this lead to?
Zombie/botnet
Spoofing
Non-compliant system
On-Path attack
On-Path attack
1102-Chap7-61: You need to know which files have been modified in a folder. Which of the folloiwing is not a way to see when the files have been modified?
Right-click each file and choose Properties, and then Advanced to see whether the archive bit is set
Open the folder in File Explorer and click Date Modified to sort the files by the date they were last modified.
Type archive at a command prompt
Type attrib at a command prompt
Type archive at a command prompt
1102-Chap7-74: A computer user wants to encrypt a few files on an NTFS volume on their Windows Pro workstation. They do not have administrative rights to the computer. Which of the following statements is correct?
They can only use device encryption
They can use BitLocker
They can use BitLocker To Go
They can use EFS
They can use EFS
1102-Chap7-77: On a windows workstation, there is one volume formatted with NTFS. The Developers group has Modify access to the C:\dev directory. You copy the folder to the C:\operations folder, to which the Developers group has Read access. What level of permissions will the Developers group have to the new C:\operations\dev directory?
Read & Execute
Read
Full Control
Modify
Read
When a folder or file is copied on NTFS volumes, the new file or folder will inherit its NTFS permissions from its new parent folder. The old permissions will be discarded. However, when files and folders are moved versus copying them, the original permissions are retained at the new location
1102-Chap7-81: A computer user wants to encrypt the data on their Win10 Home device. They have adminsitrative rights to the computer. Which of the following statements is true?
The may be able to use Windows device encryption
They can use BitLocker
They can use BitLocker To Go
They can use EFS
The may be able to use Windows device encryption
1102-Chap7-83: Which of the following statements are true regarding file and folder attrributes on a Windows 11 workstation? (choose two)
- File attributes are only available on NTFS volumes
- Only members of the Administrators group can change file/folder attributes
- Attributes can be accessed by right-clicking the file/folder and choosing Properties and then selecting the General Tab
- Compression is an advanced file/folder attribute
- Attributes can be accessed by right-clicking the file/folder and choosing Properties and then selecting the General Tab
- Compression is an advanced file/folder attribute
1102-Chap7-86: A user is working on a Windows workstation. Their user account is a member of the Managers group, and they are trying to access a folder called reports, located oin a different computer. The NTFS permissions for the reports shared folder on that computer for the Managers group are Read and Write. the folder’s share permissions for the Managers group is the Read permission. What are the user’s effective permissions on the reports folder?
Full Control
Read and Write
Read
No Access
Read
Because the user is accessing the NTFS-based resource over the network, both the NTFS and share permissions are applied. If there is a difference between the two of them, the most restrictive permissions are used. Therefore, the user has Read access only
1102-Chap7-89: Someone has placed an unauthorized wireless router on your network and configured it to the same SSID as your network. Users can access the network through that router, even though its not supposed to be there. What is this router configuration known as?
Zombie/botnet
Evil twin
Non-compliant system
On-path attack
Evil twin