Chapter 10 Flashcards

(54 cards)

1
Q

What is the role of Microsoft Windows security administration?

A

The role involves implementing security controls within the IT infrastructure and maintaining security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the C-I-A triad stand for?

A

Confidentiality, Integrity, and Availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is security administration?

A

The process of putting security controls into effect within the IT infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some tasks of security administrators?

A

Configuring and maintaining computers, user accounts, authentication methods, and monitoring security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Plan-Do-Check-Act Cycle?

A

A cycle used to implement and manage security policies effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is required to maintain confidentiality?

A

Protecting data from unauthorized access and ensuring that only authorized users can view data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the effective user in Windows security?

A

The user account that is running the process requesting object access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some security controls that protect data confidentiality?

A

Data labeling, encryption, password policies, object DACLs, Active Directory, physical access controls, anti-malware protection, OS updates, and DLP software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main goal of maintaining integrity?

A

To ensure that no unauthorized user can change data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some security controls that protect data integrity?

A

Password policies, object DACLs, Active Directory, physical access controls, message/file authentication, anti-malware protection, OS updates, and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does maintaining availability require?

A

Controls that address daily operations and unusual situations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four main types of concerns affecting data availability?

A

Attacks, performance, interruptions or disasters, and other security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some security controls that protect data availability?

A

Firewalls, IDS, IPS, performance monitors, backups, recovery plans, and resource redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of Windows Firewall administration?

A

To maintain settings for inbound and outbound rules, connection security rules, and monitor firewall performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the function of the Windows Defender Firewall with Advanced Security MMC snap-in?

A

Provides real-time performance data and identifies potential problems threatening data availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of creating backups?

A

To ensure that an organization’s data is preserved and can be restored if lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What utility does Microsoft provide for backup starting with Windows 7?

A

The Backup and Restore utility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the benefit of defining Group Policy Objects (GPOs) in Active Directory?

A

It centralizes security rules and reduces the workload of administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a DACL in Windows security?

A

A Discretionary Access Control List that determines access permissions for an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the main methods to encrypt stored data in Windows?

A

Encrypting File System (EFS), BitLocker, and BitLocker To Go.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is required for compliance in security administration?

A

Ensuring that all items in the IT infrastructure meet or exceed security goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the three main elements for satisfying security goals?

A

Clearly stated security goals, documented plans, and communication with stakeholders.

23
Q

What should a solid security plan include?

A

Security policy, security standard, security procedure, and security guidelines.

24
Q

What is the primary focus of Chapter 10 in Security Strategies in Windows Platforms and Applications?

A

The primary focus is on implementing security strategies in Windows environments.

25
True or False: Windows operating systems have built-in security features that can be configured for enhanced protection.
True
26
Fill in the blank: The __________ feature in Windows helps to isolate applications and prevent them from affecting the system.
Sandboxing
27
What is a common tool mentioned in Chapter 10 for managing security settings in Windows?
Group Policy
28
Multiple Choice: Which of the following is NOT a Windows security feature discussed in Chapter 10? A) BitLocker B) User Account Control C) Task Manager
C) Task Manager
29
What does BitLocker do?
BitLocker encrypts the entire disk to protect data.
30
True or False: User Account Control (UAC) is designed to prevent unauthorized changes to the operating system.
True
31
What is the purpose of Windows Defender?
Windows Defender provides antivirus and anti-malware protection.
32
Fill in the blank: __________ is a feature that provides a secure environment for running applications.
Windows Sandbox
33
What is the role of Windows Firewall?
Windows Firewall monitors and controls incoming and outgoing network traffic.
34
Multiple Choice: Which of the following can be controlled through Group Policy? A) User permissions B) Network settings C) Both A and B
C) Both A and B
35
True or False: Security patches should be applied as soon as they are released to ensure system security.
True
36
What does the principle of least privilege entail?
Users should have the minimum level of access necessary to perform their tasks.
37
Fill in the blank: __________ settings can be used to enforce security policies across an organization.
Group Policy
38
What is a security baseline?
A set of security configurations that provides a foundation for securing systems.
39
Multiple Choice: Which feature helps protect against unauthorized access to data on a mobile device? A) Remote Desktop B) BitLocker C) Task Manager
B) BitLocker
40
True or False: Password policies are an important part of security strategies in Windows.
True
41
What is the importance of auditing in Windows security?
Auditing tracks user activities and changes to help identify security breaches.
42
Fill in the blank: __________ is the process of verifying the identity of a user or device.
Authentication
43
What does the term 'malware' refer to?
Malware refers to malicious software designed to harm or exploit systems.
44
Multiple Choice: Which of the following is a key component of a security strategy? A) Regular updates B) Ignoring user behavior C) Disabling firewall
A) Regular updates
45
True or False: Security awareness training is unnecessary for employees in an organization.
False
46
What is the purpose of encryption in Windows security?
Encryption protects sensitive data by converting it into a format that cannot be read without a key.
47
Fill in the blank: __________ attacks involve overwhelming a system with traffic to disrupt services.
Denial-of-Service
48
What is the function of a VPN in Windows security?
A VPN encrypts internet traffic and provides a secure connection over public networks.
49
Multiple Choice: Which of the following best describes a zero-day vulnerability? A) A known vulnerability with a patch B) An unknown vulnerability exploited before a patch is available C) A vulnerability that is always present
B) An unknown vulnerability exploited before a patch is available
50
True or False: Regular backups are a critical component of a security strategy.
True
51
What is the purpose of a security incident response plan?
To provide a structured approach to managing and mitigating security incidents.
52
Fill in the blank: __________ access controls restrict access based on user roles.
Role-based
53
What is the significance of software updates in Windows security?
Software updates often include security patches that fix vulnerabilities.
54
Multiple Choice: Which of the following is an example of social engineering? A) Phishing B) Encryption C) Firewall
A) Phishing