220-1202: Domain 2 - Security Flashcards

(18 cards)

1
Q

Name common physical security measures.

A

Bollards, access control vestibule, badge reader, video surveillance, alarm systems, motion sensors, door locks, equipment locks, security guards, fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are examples of physical access security methods?

A

Key fobs, smart cards, mobile digital key, keys, biometrics (retina scanner, fingerprint scanner, palm print scanner, facial recognition technology, voice recognition technology), lighting, magnetometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define logical security concepts.

A

Principle of least privilege, Zero Trust model, access control lists (ACLs), multifactor authentication (MFA), Security Assertions Markup Language (SAML), single sign-on (SSO), just-in-time access, privileged access management (PAM), mobile device management (MDM), data loss prevention (DLP), identity access management (IAM), directory services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some MFA methods?

A

Email, hardware token, authenticator application, SMS, voice call, time-based one-time password (TOTP), one-time password/passcode (OTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are basic Defender Antivirus controls?

A

Activate/deactivate, update definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What firewall settings can be configured?

A

Activate/deactivate, port security, application security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name Windows user account types.

A

Local account, Microsoft account, standard account, administrator, guest user, power user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What login options exist on Windows OS?

A

Username/password, PIN, fingerprint, facial recognition, single sign-on (SSO), passwordless (Windows Hello)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Compare NTFS and share permissions.

A

File and folder attributes, inheritance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between “Run as administrator” and standard user?

A

Administrator has elevated privileges; standard user has limited permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is User Account Control (UAC)?

A

Security feature that prompts for permission or administrator credentials before allowing actions that could affect the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name Windows encryption technologies.

A

BitLocker, BitLocker-To-Go, Encrypting File System (EFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What Active Directory functions relate to security?

A

Joining domain, assigning log-in scripts, moving objects in organizational units, assigning home folders, applying Group Policy, selecting security groups, configuring folder redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name common wireless security protocols.

A

WPA2, WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What encryption methods are used in wireless security?

A

Temporal Key Integrity Protocol (TKIP), Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are common wireless authentication methods?

A

RADIUS, TACACS+, Kerberos, multifactor authentication

17
Q

Name common types of malware.

A

Trojan, rootkit, virus, spyware, ransomware, keylogger, boot sector virus, cryptominer, stalkerware, fileless malware

18
Q

What are examples of adware and related threats?

A

Potentially unwanted program (PUP)