IS3340 CHAPTER 7 Flashcards Preview

IS3340 SEC. STRAT. IN WINDOWS PLATFORM & APPS. > IS3340 CHAPTER 7 > Flashcards

Flashcards in IS3340 CHAPTER 7 Deck (25):
1

A evaluation of a collection of one or more objects is called an ___?

AUDIT

2

A collection of configuration settings often collected and saved for the purposes of comparing to other similar collections of configuration settings is called ___?
A structured collection, or collection of specific item versions.

BASELINE

3

An easy-to-use tool that evaluates the current security state of computers in accordance with Microsoft security recommendations is called __?

MICROSOFT BASELINE SECURITY ANALYZER (MBSA)

4

A graphical user interface framework that provides a centralized method to manage software components on Windows computers and is called ___?

MICROSOFT MANAGEMENT CONSOLE (MMC)

5

A security scanner from Shavlik that scans and analyzes the patch status of product MBSA does not support is called ___?
This also has a Limited version.

NETCHK PROTECT

6

A consumer-based vulnerability scanner from Secunia that searches for vulnerable or out-of-date programs and plug-ins is called ___?
This runs in a Web browser and does not need to be installed on the computer it is scanning.

ONLINE SOFTWARE INSPECTOR (OSI)

7

The process of comparing real computer configurations with known baselines for the purpose of documenting the pertinent differences with secure settings and similarities to insecure settings is called ___?

PROFILING

8

A tool that helps administrators to analyze a computer and compare its configuration settings against a baseline is called ___?

SECURITY CONFIGURATION AND ANALYSIS (SCA)

9

A text file that contains a list of configuration settings is called ___?

SECURITY TEMPLATE

10

An administrative program designed to run in the MMC is called ___?

SNAP-IN

11

1. A baseline is the initial settings in a newly installed system.
TRUE OR FALSE

FALSE

12

2. A baseline, also called a ___, is a collection of settings at a specific point in time.

Snapshot

13

3. Which Microsoft tool analyzes a computer's settings and compares its configuration to a baseline?

1. SCA
2. MBSA
3. NetChk
4. OSI

SCA

14

4. Stored settings that comprise a baseline are stored in which type of files?

1. Baseline configuration
2. Baseline database
3. Security template
4. Security object

Security template

15

5. The Security Configuration and Analysis tool operates as a snap-in to the ___?

MMC

16

6. Which command line tool provides the same scanning capability as SCA?

1. secedit
2. mbsacli
3. scacli
4. mbsaedit

secedit

17

7. Which of the following products does MBSA NOT analyze?

1. IIS
2. SQL Server
3. Adobe Acrobat
4. Windows 7

Adobe Acrobat

18

8. MBSA automatically ranks vulnerabilities by severity.
TRUE OR FALSE

TRUE

19

9. Which command line tool provides the same scanning capability as MBSA?

1. secedit
2. mbsacli
3. scacli
4. mbsaedit

.

20

10. Which security scanner looks for weak passwords?

1. SCA
2. OSI
3. NetChk Protect
4. MBSA

MBSA

21

11. What does NetChk Protect Limited do that MBSA does not do?

1. Scans the latest Microsoft products
2. Scans legacy Microsoft products
3. Scans all Microsoft products
4. Scans selected Microsoft products

Scans legacy Microsoft products

22

12. Which security scanner runs in a Web browser and doesn't require that you install a product before scanning?
1. NetChk Protect Limited
2. MBSA
3. OSI
4. PSI

OSI

23

13. Which of the following statements best describe the relationship between profiling and auditing?

1. Auditing is often a part of profiling
2. Profiling is often a part of auditing
3. Profiling and auditing are interchangeable terms
4. If auditing is in place profiling is not necessary

Profiling is often a part of auditing

24

14. When designing an audit strategy, you should log access attempts on the ___ number of objects.

Minimum

25

15. What is the main purpose of an audit?

1. Uncover problems
2. Catch errors
3. Validate compliance
4. Standardize configurations

Validate compliance