2.1 Flashcards

(39 cards)

1
Q

What else do we call a access control vestibule ?

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a mantrap work ?

A

Two door verification.
Door 1: 1st verification, enter R1, door 1 locks.
Door 2: 2nd verification, enter R2, door 2 locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Badge reader

A

Magnetic swipe, RFID, or NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP video system considerations

A

Bandwidth
QOS
Storage
Capital Expenditure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can be physically attatched to device to prevent access/theft ?

A

Equipment locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What infastructure is commonly found on the outside of a site to prevent theft ?

A

Bollards and fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do key fobs work ?

A

Radio signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How smart cards work ?

A

Card has info about you and your privileges. You access resources at a terminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is lightning useful for physical security ?

A

Simple usage. Shine a light on something dodgy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are magnetometers primarily used for ?

A

Detecting metal e.g. weapons MURICA !

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Where are ACL’s typically found ?

A

Set of rules to control access
Typically found in Firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is active directory used for ?

A

Locate resources and configure security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where can group policies and update be applied to ?

A

Users, computers, domains and OU’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multifactor authentication (formally two-factor authentication),The three
main factors ?

A

Something You Are, Something You Have, and Something You Know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software Token/Authenticator Application

A

An app that generates a password (typically a six-digit code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a login script ?

A

A script that automatically runs when a user logs in.

17
Q

What tasks may a login script perfom ?

A

Mapping network drives, setting a default printer, or running specific programs for the user.

18
Q

What is a domain controller ?

A

Authenticates users and ensures that they have permission to log in.

19
Q

What must each AD device be a member of ?

20
Q

What does a group policy do ?

A

Provides Controls to users and computers.

21
Q

What is contained within a homefolder ?

A

The user’s personal files Documents, Desktop,
Music, Photos, and Videos.

22
Q

What is folder redirection ?

A

Moving a folder, typically a home folder to a server. Allows access from multiple devices.

23
Q

What is active directory commonly used to do ?

A

Reset passwords
Add/remove accounts

24
Q

What is a domain ?

A

The name associated with a related group of users, computers, and resources.

25
What is a organizational unit ?
Keeps database organized e.g. Users, Computers.
26
What protocol does AD use ?
Lightweight Directory Access Protocol
27
What is LDAP primarily used for ?
User accounts, directory info, email, web services, and authentication services.
28
Is AD an authentication mechanism ?
No. It's the directory for storing and looking up of objects
29
When a user authenticates against an Active Directory domain, how do they access particular resources ?
A domain access token is issued.
30
What is group policy a feature of ?
Active directory.
31
What is a domain in Active Directory? A) A group of computers that share a common network B) A group of users with the same permissions C) A hierarchical structure used to organize network resources D) A type of user account with administrative privileges
C) A hierarchical structure used to organize network resources.
32
What is a forest in Active Directory?
A group of domains that share the same schema.
33
What is a user object in Active Directory?
A representation of a user account
34
Something you know examples ?
Username Password PIN Answer to a question
35
Something you have examples ?
Smart card, email, hard token, soft token, SMS, voice call, Authenticator App.
36
Something you are examples ?
Biometric: Fingerprint Palm print Retina Scan Face scan
37
What is a hard token ?
Hardware device that generates a number to login
38
What is a soft token ?
An app that generates a number to login.
39
GPO
Group policy object