Configure Workstation Security Flashcards

Lesson 17A (43 cards)

1
Q
A

Using the local Group Policy editor to view password policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

Using the Properties dialog box to unlock a user account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

Configuring AutoPlay. D3300 is a digital camera that has been connected to the computer previously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

Windows Defender Antivirus configuration page within the Windows Security app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A

The Real-time protection setting can be toggled off to disable Windows Defender Antivirus temporarily.V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A

Windows Defender Firewall with Advanced Security—Profile Settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A

Configuring inbound filtering rules in Windows Firewall with Advanced Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A

Applying encryption to a folder using EFS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A

A file that has been encrypted cannot be opened by other users—even administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A

Configuring BitLocker and BitLocker To Go via the Control Panel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A

Removable drive protected with BitLocker To Go. (Screenshot courtesy of Microsoft.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Length & Complexity: A strong password

A
  • should be at least 12-16 characters long, incorporating uppercase and lowercase letters, numbers, and special symbols.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

passwords

Avoid Common Words:

A

-Using dictionary words, personal information, or predictable sequences (like 123456 or password) makes passwords highly vulnerable to brute-force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

password

  • Unique Passwords Per Account:
A

Reusing passwords across multiple accounts increases the risk—if one password is compromised, all linked accounts become accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

passwords

  • Password Managers:
A

These tools help generate and store complex passwords, eliminating the need for users to remember multiple credentials manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

passwords

  • Regular Updates:
A

Changing passwords periodically reduces the risk of long-term exposure in case of a breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

passwords

  • Multifactor Authentication (MFA):
A

Even if a company can’t universally implement MFA, using it where possible significantly strengthens security by requiring a secondary authentication factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

passwords

  • Monitoring for Breaches:
A

Keeping an eye on password breaches using services like Have I Been Pwned can alert users if their credentials have been exposed.

19
Q

BIOS/UEFI passwords

A

restrict system access before booting, with UEFI potentially supporting pre-boot authentication for network credential verification.

20
Q

End-user security best practices

A

involve locking workstations when unattended, securing devices against theft, and protecting personal and confidential information from exposure or unauthorized access.

21
Q

Account management

A

follows the principle of least privilege, limiting user permissions and minimizing admin accounts to reduce security risks, with protections like UAC and sudo.

22
Q

Default administrator accounts

A

should be disabled if possible; otherwise, they must be secured with unique passwords, monitored for usage, and restricted to prevent unauthorized access or privilege misuse.

23
Q

Guest accounts

A

allow unauthenticated access, so they should be disabled unless required for specific functions like passwordless file sharing, and monitored across systems to ensure compliance with security policies.

24
Q

Account policies

A

enforce security controls through OS settings like Local Security Policy and Group Policy Objects, implementing login time restrictions, failed attempt lockouts, concurrent session limits, and automatic screen locking to enhance protection against unauthorized access.

25
Execution control
strengthens security by preventing malicious software from running, ensuring protection beyond user authentication and authorization policies.
26
Restricting untrusted software
execution prevents malware spread, with Windows enforcing controls via UAC and system policies, Linux using cryptographic key signing, mobile OS vendors adopting store-based security, and third-party suites enabling allowlists or blocklists for application control.
27
AutoRun and AutoPlay
AutoRun in legacy Windows versions allowed automatic execution of files, posing a security risk, while modern Windows mitigates this by prompting users through AutoPlay and requiring explicit permission via User Account Control (UAC). autorun.inf file stored in the root of the drive
28
Windows Defender Antivirus
is a built-in security solution for Windows that detects and prevents malware execution using signature-based detection and heuristic analysis, reinforcing workstation security against social engineering attacks, exploits, and various forms of malicious software.
29
Windows Defender Antivirus updates
relies on frequent updates, including virus definitions to detect new threats and scan engine updates to improve performance, both delivered through Windows Update or third-party updaters.
30
Windows Defender Antivirus Deactivation
can be temporarily disabled via the Real-time protection toggle but will reactivate automatically, while permanent deactivation requires group policy changes or third-party antivirus installation; exclusions can be set for performance or false-positive concerns.
31
Windows Defender Firewall Console
filters inbound and outbound network traffic, allowing configuration of port, application, and address-based security triggers through the Advanced Security console or group policy.
32
End of Life (EOL)
signifies the stage when a product or software is no longer manufactured, sold, or supported by the vendor
33
BYOD
bring your own device
34
DoS (Denial-of-Service)
This can be done by flooding the network with traffic, sending illegitimate service requests, or exploiting vulnerabilities in the target system.
35
Account management policies
define user rights and privileges, ensuring access is restricted based on the principle of least privilege to minimize security risks.
36
Restricting user permissions
minimizes security risks by limiting file access to data owners or administrators and reducing the number of superuser accounts, with protections like UAC and sudo enforcing access control.
37
Default administrator accounts
should be disabled if possible or secured with unique passwords, monitored for usage, and restricted to prevent unauthorized access or privilege misuse.
38
Guest accounts
allow unauthenticated access, so they should be disabled unless needed for specific functions like passwordless file sharing, and monitored to ensure compliance with security policies.
39
Account policies
enforce security controls through OS settings like Local Security Policy and Group Policy Objects, implementing login time restrictions, failed attempt lockouts, concurrent session limits, and automatic screen locking to enhance protection against unauthorized access.
40
Execution control
uses logical security technologies to prevent malicious software from running, ensuring system security without relying solely on user behavior.
41
Restricting unapproved software execution
prevents malware spread, with Windows enforcing controls through UAC and system policies, Linux relying on cryptographic key signing, mobile OS vendors using store-based security, and third-party tools enabling allowlists or blocklists for application control.
42
Encrypting File System (EFS)
in NTFS protects data-at-rest by encrypting individual files and folders, restricting access to the original user. Strong authentication is crucial, as encryption relies on the user's password, with recovery options available to prevent data loss.
43
Windows BitLocker
provides full disk encryption (FDE) for fixed and removable drives, securing data without user intervention. It uses a trusted platform module (TPM) for encryption key storage, with alternatives like smart cards or USB drives. A recovery key is generated during setup for data retrieval if the startup key is lost.