220-1202: Domain 2 - Security Flashcards
(18 cards)
Name common physical security measures.
Bollards, access control vestibule, badge reader, video surveillance, alarm systems, motion sensors, door locks, equipment locks, security guards, fences
What are examples of physical access security methods?
Key fobs, smart cards, mobile digital key, keys, biometrics (retina scanner, fingerprint scanner, palm print scanner, facial recognition technology, voice recognition technology), lighting, magnetometers
Define logical security concepts.
Principle of least privilege, Zero Trust model, access control lists (ACLs), multifactor authentication (MFA), Security Assertions Markup Language (SAML), single sign-on (SSO), just-in-time access, privileged access management (PAM), mobile device management (MDM), data loss prevention (DLP), identity access management (IAM), directory services
What are some MFA methods?
Email, hardware token, authenticator application, SMS, voice call, time-based one-time password (TOTP), one-time password/passcode (OTP)
What are basic Defender Antivirus controls?
Activate/deactivate, update definitions
What firewall settings can be configured?
Activate/deactivate, port security, application security
Name Windows user account types.
Local account, Microsoft account, standard account, administrator, guest user, power user
What login options exist on Windows OS?
Username/password, PIN, fingerprint, facial recognition, single sign-on (SSO), passwordless (Windows Hello)
Compare NTFS and share permissions.
File and folder attributes, inheritance
What is the difference between “Run as administrator” and standard user?
Administrator has elevated privileges; standard user has limited permissions
What is User Account Control (UAC)?
Security feature that prompts for permission or administrator credentials before allowing actions that could affect the system
Name Windows encryption technologies.
BitLocker, BitLocker-To-Go, Encrypting File System (EFS)
What Active Directory functions relate to security?
Joining domain, assigning log-in scripts, moving objects in organizational units, assigning home folders, applying Group Policy, selecting security groups, configuring folder redirection
Name common wireless security protocols.
WPA2, WPA3
What encryption methods are used in wireless security?
Temporal Key Integrity Protocol (TKIP), Advanced Encryption Standard (AES)
What are common wireless authentication methods?
RADIUS, TACACS+, Kerberos, multifactor authentication
Name common types of malware.
Trojan, rootkit, virus, spyware, ransomware, keylogger, boot sector virus, cryptominer, stalkerware, fileless malware
What are examples of adware and related threats?
Potentially unwanted program (PUP)