CompTIA A+ 1201 - 2.0 Security Flashcards
(99 cards)
Shadow IT
Shadow IT is any software, hardware or IT resource used on an enterprise network without the IT department’s approval and often without IT’s knowledge or oversight.
Share Permissions
Full Control - Change permissions and all else.
Change - Change but not permissions.
Read - Read only.
Folder Permissions - Read
View files and subfolders including their attributes, permissions and ownership.
Folder Permissions - Write
Create new folders and files, change attributes, view permissions and ownership.
Folder Permissions - List
View the names of files and subfolders
Folder Permissions - Read & Execute
Pass-through folders for which no permissions are assigned, plus read and list permissions.
Folder Permissions - Modify
Includes read/execute and write permissions, as well as the ability to rename and delete the folder.
Folder Permissions - Full Control
All previous permissions, plus changing permissions, taking ownership and deleteing files/subfolders.
File Permissions - Read
Read the contents of the file and view attributes, ownership and permissions.
File Permissions - Write
Overwrite the file and view attributes, ownership and permissions.
File Permissions - Read & Execute
Read permissions, plus the ability to run applications.
File Permissions - Modify
Includes Read/Execute and Write permissions, as well as the ability to rename and delete the file.
File Permissions - Full Control
All previous permissions, plus changing permissions and taking ownership.
Windows Server Domain Controller
Any Windows based server that provides domain authentication services (logon services) is reffered to as a Domain Controller.
Active Directory Domain Services (ADDS)
The database that contains the users, groups, and computer accounts in a Windows Server Domain.
Member Servers
Any server based system that has been configured into the domain, but do not maintain a copy of Active Diretory (Exchange, SQL, Web etc)
Organisation Units (OU’s)
In WIndows Active Directory, a way of dividing up the domain into different administrative realms.
Logon Script
A file containing commands that run each time a user logs onto a computer to set up the user environment.
CIA Triad
Confidentiality - Keeping information and communications private and protected from unauthorized access.
Integrity - Ensuring that data is not altered or tampered with.
Availability - Ensuring that systems operate continuously and that authorized individuals can access what they need.
Execution Control (Hardening)
A security technique in which the default configuration of a system is altered to protect the system against attacks.
Logical Security
Controls implemented within software to create an access control system. (Firewall etc)
Triple A
Authentication - A means to prove identity to computer systems.
Authorization - The process of determining what rights and priveliges a particular entity has.
Accounting - The process of tracking and recording system activities and resource access. (Auditing)
Implicit Deny
Unless something has explicitly been granted access, it should be denied access. (You’re not on the list pal)
Least Privelige
Something should be allocated the minimum necessary rights, priveliges or information to perform its role.