Lesson 9 - Chapter 2: Authorization Flashcards

1
Q

What is authorization?

A

giving permission to access certain resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which happens first, authorization or authentication?

A

authentication, authorization relies upon on the accuracy of authentication methods used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s another name for authorization?

A

access control

(because you’re controlling who can access a resource)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The primary consideration in access control is the principle of least privilege. What does that mean?

A

The permissions and rights assigned to a user account should be the minimum they need to perform their tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you make sure you keep user access permissions tight? (2)

A
  1. Disable any unused user accounts
  2. Remove all other permissions, and assign only the access required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens when a user is a member of more than one group? What permissions do they have?

A

their permissions are combined from each group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When you combine all the permissions a user has across multiple groups, what is that called?

A

effective permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some ways you can use directory permissions? (3)

limit
protect
protect

A
  1. limit access to sensitive information on a shared file server
  2. protect others from snooping your user-specific files on a multi-user system
  3. protect a system’s software from being compromised by any scripts/programs that are run by a user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Using strict directory permissions won’t work if a bad actor has access to what?

A

if someone has physical access to the hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do you use to protect (hard drive) data while it is at rest (not moving around the network)?

A

full-disk data encryption (like BitLocker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s one thing to pay attention to when it comes to default accounts and groups?

A

the default groups (Everyone, Guest, Users) are a broad group, so never use them unless you want to permit ALL of those people access

(you can use them but remember to configure them with the proper permissions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does ACL stand for?

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an ACL?

A

Access Control List,
A list that determines who or what can have access to a certain resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 basic types of ACLs?

A
  1. A list stored in the boot drive of a file system; provides the basis for user/group permissions
  2. A list of allowed MAC addresses from a wireless network that is stored on a WAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the differences and similarities between the 2 basic ACL types?

A

they work differently, but both share an ability to permit or block access to a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Permissions control how users….

A

access resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are policies?

A

permissions for activities (access command prompt, install software, log-on times, etc)

(different from an ACL which are true permissions that control access to a certain resource)

18
Q

What type of policies can you find in the Local Security Policy? (secpol.msc)

A

More than password policies, many policies for managing security

19
Q

Where would you find the setting that prevents a Guest account from signing into the computer from the network?

A

Local Policies > User Rights Assignment

20
Q

Local Policies work great for individual systems, but a pain to apply the same settings to more than 1 PC on your network. What’s the next step up you can use to apply policy settings to a whole group at once?

A

Windows Active Directory’s domain-based Group Policy utility

21
Q

What would you use to set a default wallpaper for every PC in your domain?

A

Group Policy

22
Q

What is data at rest?

A

Data that is not in use (in memory) or is being transmitted

23
Q

How is data at rest best protected in its helpless state?

A

encryption

24
Q

What is encryption?

A

the conversion of plain text into cipher text

25
Q

What is the most common encryption method used on data at rest?

A

symmetric encryption

26
Q

What is symmetric encryption?

A

uses the same encryption key to encode and decode the data

27
Q

What are the 4 types of encryption that can be applied to data at rest?

A
  1. Application-level
  2. File system
  3. Database
  4. Full-disk Encryption (FDE)
28
Q

What is application-level encryption?

A

Data is encrypted by the same application that generates or modifies the data on the client, workstation, or server. This method allows it to include rules for user logon levels.

29
Q

What is File System encryption? Access to data can target what?

A

this type can target specific data, files, and folders. Access to data can be tied to user accounts and may require password/PIN.

30
Q

What’s an example of File System encryption that we have seen in previous lessons?

A

NTFS’s Encrypting File System (EFS) is an example of file and folder encryption

31
Q

What is database (data at rest) encryption?

A

database data is included when all or parts of a database are encrypted

32
Q

What is full-disk encryption?

A

the entire content of a storage device are encrypted and access typically requires authentication (BitLocker)

33
Q

What is the most secure protection for data at rest?

A

full-disk encryption

34
Q

What are the 2 main tools for encrypting data at rest in Windows? What Windows editions are they available in?

A
  1. Encrypting File System
  2. BitLocker

available in all editions except Home

35
Q

How do you enable EFS encryption?

A

Right click file or folder > Properties > Advanced > Check ‘Encrypt Contents to Secure Data’

36
Q

If User A uses EFS to encrypt a folder on their system drive, can Admin B read the folder?

A

No, not unless User A provides the EFS certificate to Admin B

37
Q

What’s the primary purpose of BitLocker?

A

To prevent the data on a disk from being read if it’s removed from the PC by encrypting the entire disk

38
Q

What’s the difference between BitLocker and EFS?

A

EFS encrypts folders/files and BitLocker encrypts the entire disk

39
Q

An Admin account is required to change the settings for which: BitLocker or EFS?

A

BitLocker because it affects all users (EFS is for own user files)

40
Q

Where do you go to find the BitLocker setting to enable it? in Win 10(3)/11(4)

A

Win10: Control Panel > System and Security > BitLocker

Win11: Settings > Privacy & Security > Device Encryption > Bitlocker

41
Q

T or F: You can edit group policies at a command prompt using the gpresult command.

A

False