14-C Flashcards

(50 cards)

1
Q

What do logical access controls ensure?

A

Each user is identified and authenticated before being allowed to use a host or network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a security control?

A

A safeguard or prevention method to avoid, counteract, or minimize risks relating to personal or company property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the three types of security controls.

A
  • Physical controls
  • Procedural controls
  • Logical controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are physical controls?

A

Controls that work in the built environment to control access to sites. Examples include fences, doors, and locks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are procedural controls?

A

Controls applied and enforced by people. Examples include incident response processes, management oversight, and security awareness training programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are logical controls?

A

Controls applied and enforced by digital or cyber systems and software. Examples include user authentication, antivirus software, and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the AAA triad stand for?

A
  • Authentication
  • Authorization
  • Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define authentication in the context of access control.

A

The process of identifying an account and ensuring that it can only be operated by someone who can supply the correct credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is authorization?

A

Access to resources is allowed only to accounts with defined permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does accounting refer to in an access control system?

A

Logging when and by whom a resource was accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a permission in security settings?

A

A security setting that determines the level of access an account has to a particular resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an access control list (ACL)?

A

A list attached to each resource that specifies the permissions for each subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does implicit deny mean?

A

Unless there is a rule specifying that access should be granted, any request for access is denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the principle of least privilege?

A

A user should be granted the minimum possible rights necessary to perform their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a local account in Windows?

A

An account defined on a specific computer only, stored in the Security Account Manager (SAM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Microsoft account?

A

An account managed via an online portal, identified by an email address, and can synchronize profile settings between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a security group?

A

A collection of user accounts used to assign permissions and rights more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary function of the Administrators group?

A

Members have very high access to all files and system tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens when the Guest user account is enabled?

A

It allows file sharing without passwords but is disabled by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does User Account Control (UAC) do?

A

Protects the system against malicious scripts and requires user consent for performing privileged tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is multifactor authentication (MFA)?

A

A security process that requires the user to provide at least two different kinds of credentials.

22
Q

What is 2-step verification?

A

A method where a soft token is generated and sent to a registered method to verify a sign-in request.

23
Q

What is an authenticator application?

A

An application that can be used for passwordless access or as a two-factor authentication mechanism.

24
Q

What is hard token authentication?

A

Authentication using a physical device like a smart card or USB drive to transmit credentials.

25
What are the three Windows authentication scenarios?
* Windows local sign-in * Windows network sign-in * Remote sign-in
26
What is Windows Hello?
A subsystem allowing the user to authenticate using alternative methods, such as a PIN or biometric recognition.
27
What is required to set up Windows Hello?
A PIN must be configured ## Footnote The PIN acts as a backup mechanism if other methods become unavailable.
28
What does fingerprint authentication use to verify identity?
A sensor to scan the unique features of the user’s fingerprint
29
How does facial recognition work in Windows Hello?
Uses a webcam to scan the user’s face and records a 3-D image with infrared (IR) sensor
30
What is a security key in the context of Windows Hello?
A removable USB token or smart card, or a trusted smartphone with an NFC sensor
31
What does Single Sign-On (SSO) allow users to do?
Authenticate once to gain access to multiple applications or services
32
What are the advantages of Single Sign-On (SSO)?
Users do not manage multiple digital identities and passwords
33
What is a disadvantage of Single Sign-On (SSO)?
Compromising one account compromises multiple services
34
What does Windows Hello for Business aim to achieve?
Transition to passwordless SSO
35
What is the role of the Domain Controller (DC) in a Windows domain?
Stores Active Directory and provides authentication services
36
What is an Organizational Unit (OU) in Active Directory?
A way of dividing a domain into different administrative realms
37
What is the purpose of Group Policy in a domain?
Configures computer settings and user profile settings
38
What command is used to apply new or changed policies to a computer immediately?
gpupdate
39
What does the gpresult command do?
Displays the Resultant Set of Policies (RSoP) for a computer and user account
40
What is Mobile Device Management (MDM)?
Software to apply security policies to mobile devices in the enterprise
41
Fill in the blank: A _______ is a server-based system joined to the domain that does not maintain a copy of the Active Directory database.
member server
42
True or False: A local account can be used to access multiple computers.
False
43
What happens when a user attempts to access a network with an unregistered device?
Access is denied based on administrator-set parameters
44
What are the three principal user security groups created when Windows is installed?
* Administrators * Users * Guests
45
What tool is used to add a user to a local security group?
Computer Management
46
What is the function of a login script?
Performs configuration or process activity when the user signs in
47
What is the main function of Active Directory?
To manage user, group, and computer objects in a network
48
True or False: Group Policy Objects (GPOs) can be linked to multiple OUs.
True
49
What is the purpose of security groups in Active Directory?
To assign permissions more easily and robustly
50
What is the significance of the TPM in Windows Hello?
Stores the private key securely within the user device