4.4 Given a scenario, differentiate common account management practices. Flashcards

1
Q

Guest Account

A

only should use them on a kiosk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Service account

A

an account for some equipment like HVAC typically admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Least Privilege

A

giving the least amount of rights to do your job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

onboarding

A

bring a new person or equipment into the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

offboarding

A

a person or equipment leaving your organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Permission auditing or review

A

twice a year review of accounts and permissions to verify accounts still have the appropriate permissions. used to combat privilege creep.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Usage Auditing and Review

A

audit what the account is doing.
designed to ensure that the account is being used in accordance with company security policies and being used for legitimate, work-related purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TIme of Day restrictions

A

Limits when a user can log into their accounts and access resources based on the time of day,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Standard Naming Convention

A

A format for naming users accounts or equipment names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Account Maintenance

A

Making sure all employees have the appropriate rights and permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Group-Based Access Control

A

access control using groups that the users are placed into to allow or restrict permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Credential Management

A

A Service or software designed to store, manage and track user credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Group Policy

A

provides the centralized management and configuration of operating systems, applications, and users’ settings in an Active Directory environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password Complexity

A
Refers to requiring the following in a password;
– Password Length
– Upper case letters
– Lower case letters
– Numbers
– Special characters such as !@#$% etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Expiration

A

Refers to the maximum age of a password or account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disablement

A

also called account expiration

17
Q

Recovery

A

process of admin getting your password back

Its better to just change it instead recovering

18
Q

Lockout

A

Locks a user account after a set number of failed logon attempts.

19
Q

Password History

A

Determines the number of unique passwords that must be used before an old one can be reused.
“Can’t be any of your previous 10 passwords”

20
Q

Password Reuse

A

Using a single password on multiple separate accounts. NOT the same as history
“You cannot use the same password here that you used in windows”

21
Q

Password Length

A

Determines the minimum number of characters a password can have.
“your password must be 16 charactors”

22
Q

Your company has several shifts of workers. Overtime and changing shifts is prohibited due to the nature of the data requirements of the contract. To ensure that workers are able to log into the IT system only during their assigned shift, you should implement what type of control?

A. Multifactor Authentication
B. Time-of-day restrictions
C. Location Restrictions
D. Account lockout

A

B. Time-of-day restrictions

23
Q

You are installing a new network service application. The application requires a variety of permissions on several resources and even a few advanced user rights in order to operate properly. Which type of account should be created for this application to operate under?

A. Service
B. User
C. Privileged
D. Generic

A

A. Service

24
Q

Which of the following is a recommended basis for reliable password complexity?

A. Require that each administrator have a normal user account in additions to a privileged account.
B. Allow for maximum of three failed log on attempts before locking the account.
C. Require that a password have 16 characters and be changed regularly.
D. Minimum of eight characters; include representations of at least three of the four character types.

A

D. Minimum of eight characters; include representations of at least three of the four character types.