Configure Windows Security Settings Flashcards

Lesson 14C (58 cards)

1
Q
A

Configuring members of the Administrators built-in group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

UAC requiring confirmation of the use of administrator privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

Configuring UAC notifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

Configuring Windows Hello sign-in options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A

Security groups in Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A

Group Policy Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A

Configuring iOS device enrollment in Microsoft’s Intune Enterprise Mobility Management (EMM)
suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Logical security controls

A

are digital safeguards that protect systems and data through authentication, authorization, and accounting mechanisms, ensuring only authorized users can access resources while monitoring and enforcing security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Control Classes

A
  • Physical controls: Examples fences, doors, and locks.
  • Procedural controls Examples incident response processes/ management oversight/training programs.
  • Logical controls: Examples user authentication, antivirus software, and firewalls.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

access control system

A
  • Authentication
  • Authorization
  • Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

access control systems

Authentication

A

ensures that users and systems are verified through unique accounts and credentials, allowing only authorized access to protect security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

access control systems

Authorization

A

ensures that users can access resources based on predefined permissions, with access control lists defining actions they can perform, such as reading or editing files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

access control systems

Accounting

A

means logging when and by whom a resource was accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

access control list (ACL)

A

defines permissions for resources, specifying allowed actions for users, computers, or services based on identifiers like MAC address, IP address, port number, or security ID (SID).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Implicit deny

A

is a security principle where access is denied by default unless explicitly permitted, commonly used in ACLs and firewall policies to ensure unauthorized requests are blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

least privilege

A

security principle, balancing security with usability to minimize risks(challenging) and support overhead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

user account

A

is the principal means of controlling access to computer and network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

user account

local account

A

defined on a specific computer, stored in the Security Account Manager (SAM) within the KEY_LOCAL_MACHINE registry, and cannot be used to access other devices or network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

user account

Microsoft account

A

an online identity linked to an email address, allowing access to multiple devices and services while enabling synchronization of profile settings across them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Security Groups

A

are collections of user accounts used for efficient permission management, with built-in groups like Administrators having high-level access, while custom groups enforce least privilege principles for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

security group

standard account

A

has limited system permissions, allowing them to manage their profile settings, run applications, install store apps, use printers, and shut down the computer, while administrative accounts should be restricted for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

security groups

Guest group

A

is only present for legacy reasons. It has the same default permissions and rights as the User group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

security groups

Power Users

A

was originally designed to provide intermediate permissions between administrators and standard users but was deprecated in Windows 10/11 due to security risks, now functioning with the same permissions as the Users group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Local Users and Groups management console
allows administrators to manage user and group accounts, including creating, modifying, disabling, deleting accounts, resetting passwords, and configuring group memberships.
26
The net user command
in an administrative command prompt allows user account management, including adding accounts, enforcing password changes, disabling accounts, viewing account properties, and assigning accounts to local groups like Administrators.
27
# net user command *net user dmartin Pa$$w0rd /add /fullname:"David Martin" /logonpasswordchg:yes*
Add a new user account and force the user to choose a new password at first login:
28
# net user command *net user dmartin /active:no*
Disable the dmartin account:
29
# net user command *net user dmartin*
Show the properties of the dmartin account:
30
# net user command *net localgroup Administrators dmartin /add*
Add the dmartin account to the Administrators local group:
31
User Account Control (UAC)
Windows security feature that enforces least privilege by requiring explicit user consent for privileged tasks. * * UAC are shown with a Security Shield icon * run admin short cut: (More > Run as administrator) or press CTRL+SHIFT+ENTER to open it.
32
Windows PowerShell
It's essentially a more advanced and versatile version of the traditional **Windows Command Prompt** on a .NET Framework.
33
Authentication
ensures users verify their identity before accessing accounts by supplying credentials categorized as knowledge (passwords), possession (smart cards), or inherence (biometrics).
34
# authentication Multifactor authentication (MFA)
means that the user must submit at least two different kinds of credential.
35
# authentication 2-step verification (2FA)
enhances security requiring users to confirm their identity with a soft token sent to a trusted contact method, such as email or SMS, whenever logging in from a new device or location.
36
# authentication authenticator application
like Microsoft Authenticator, enhances security by enabling passwordless access or two-factor authentication (2FA), requiring users to verify their identity through a trusted device, encrypted registration, and secure prompts before granting access.
37
# authentication Hard token authentication
uses a physical device, like a smart card or USB drive, to securely store credentials, requiring user authorization via password, PIN, or biometrics before transmitting authentication data to the service for access.
38
# Windows Login Options Windows authentication
operates through different login scenarios: * local sign-in, where the Local Security Authority (LSA) verifies credentials against the Security Accounts Manager (SAM); * network sign-in, where credentials are authenticated using Kerberos * remote sign-in, which relies on VPN or web-based authentication when outside the local network.
39
# Windows Login Options Username and Password
is the standard authentication method where users create an account with a password that can be changed via CTRL+ALT+DELETE or account settings, while administrators can reset passwords using Local Users and Groups.
40
# Windows Login Options Windows Hello
provides secure authentication through PINs, fingerprint scanning, facial recognition, and security keys, utilizing encryption and hardware protections like Trusted Platform Module (TPM) and infrared (IR) sensors to prevent unauthorized access.
41
# Windows Login Options Single sign-on (SSO)
allows users to authenticate once and gain access to multiple applications or services, with Kerberos facilitating SSO in Active Directory environments. While SSO simplifies credential management, compromised accounts pose security risks. Windows Hello for Business enhances security by using passwordless SSO, leveraging public/private encryption keys stored in Trusted Platform Module (TPM) to verify users without transmitting credentials over the network.
42
Trusted Platform Module (TPM) | Single sign-on
is a dedicated chip on a computer's motherboard that enhances security by securely storing cryptographic keys.
43
# Windows Login Options Kerberos | Single sign-on
It uses symmetric-key cryptography and a Key Distribution Center (KDC) to distribute secret keys and issue tickets, allowing users to authenticate without directly exchanging passwords.
44
Windows domains and Active Directory
provide scalable authentication for organizations, allowing domain accounts to access multiple machines without requiring separate credentials, unlike local accounts, which are device-specific and must be managed individually.
45
# Windows Login Options domain controller (DC)
is a Windows Server computer that manages network authentication through **Active Directory (AD)**, storing user, group, and computer objects while ensuring secure and scalable access, with **Domain Admins** controlling account management.
46
**member server**
is a domain-joined system that does not store a copy of **Active Directory (AD)** but provides services like file sharing, printing, email (Exchange), and databases (SQL Server), using **Kerberos** for single sign-on authentication.
47
# Active Directory Security groups
in a domain simplify permission management by assigning access rights to user accounts collectively. Members of **Domain Admins** can sign in on any domain-joined computer, including domain controllers (DCs), while **Domain Users** have restricted access, typically limited to specific workstations.
48
# Active Directory Windows domains
use **Active Directory (AD)** to centralize authentication and authorization, with **domain controllers (DCs)** managing accounts, **security groups** assigning permissions, **organizational units (OUs)** delegating administrative control, and **Kerberos-based single sign-on (SSO)** ensuring seamless access across domain resources.
49
# Active Directory Organizational Units (OUs)
**segment a domain into administrative divisions,** allowing delegated control over account management while maintaining centralized security policies. They enable structured access control, ensuring users can authenticate only within designated OUs, like limiting "Sales" department users to Sales-related systems.
50
# Active Directory Active Directory (AD) hierarchy
1. Forest 2. Trees 3. Domain 4. Organizational Units (OUs) 5. Ojects: They represent various entities like users, computers, printers, groups, etc.
51
Group Policy
allows administrators to centrally configure security settings, user profiles, and software deployment across multiple domain-joined computers, with **Group Policy Objects (GPOs)** linked to domains or **Organizational Units (OUs)** to enforce settings, while **Resultant Set of Policies (RSoPs)** determines the final applied configurations.
52
# Group Policy group policy objects (GPOs)
streamline administrative control by applying predefined policies to multiple users and computers within a **domain** or **Organizational Unit (OU)** in **Active Directory (AD)**, with **inheritance rules** determining the **Resultant Set of Policies (RSoPs)** for each account.
53
# Group Policy Resultant Set of Policy (RSoP)
is a feature in Microsoft Windows that helps administrators understand and troubleshoot Group Policy settings applied to users and computers.
54
# Group Policy Group Policy updates
use two key command-line tools: **gpupdate**, which applies new policies immediately and can force a full refresh, and **gpresult**, which displays the **Resultant Set of Policies (RSoP)** for a user or computer, allowing administrators to verify applied settings.
55
# Group Policy logon script
is a set of instructions that a computer executes automatically when a user logs in. They are commonly used in Active Directory environments and can be configured through Group Policy.
56
Mobile Device Management (MDM)
A software that enforces security policies for enterprise and **bring your own device (BYOD)** smartphones, controlling access to corporate data, applications, and built-in device functions based on administrator-defined parameters.
57
# Mobile Device Management is a cloud-based enterprise mobility management (EMM), which is A software that enforces security policies
Microsoft’s Intune Enterprise Mobility Management (EMM)
58