Managing User Account & Password Security Flashcards

1
Q

When a user leaves the organization, what’s the best thing to do with their account?

A

Disable it until you know what should happen to it as you may want to re-use it again for another employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should be set on a temporary employee’s account as part of good management?

A

Set the account to expire on their last expected day of work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Admin, Analyst, Root and Wizard are example of what not to use for which type of username?

A

The Maintenance/Admin Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the recommended length of a good password?

A

Between 8 and 15 characters long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 5 password management methods

A

1) Automatic Account Lockouts
2) Password Expiration
3) Password History exclusion
4) Min password length
5) Complex multi-character passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is it recommended that a network admin should unlock any locked out accounts instead of the operating system doing it automatically?

A

So they can be sure to know about any possible security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It’s ok to use the default password expiry length on your network operating syste. TRUE or FALSE?

A

FALSE - these defaults are usually known by hackers so change it in accordance with your security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does single sign on use to allow users to access multiple resources with the same password?

A

an access token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where is the local user database located and what is ti called?

A

In windows\system32\config. it is called the Security Accounts Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What 3 additional attributes other than the DN (Distinguished Name) and RDN ( Relative DN) does LDAP use to identify an entry in its database?

A

1) Common Name (CN)
2) Domain Component (DC)
3) Organizational Unit (OU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What standard provides an entity with the credentials to prove its identity and associates that identity with a public key?

A

An X.509 certificate (it’s the standard that defines security certificates)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the 3 Verisign digital certificate classes

A

1) for individuals and email. These get saved by browsers
2) For organizations
3) For servers and software signing in which independent checking is done by the Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the 5 ways in which a user could identify themselves

A

Kill All People And Dogs

1) something they KNOW
2) something they ARE
3) something they POSSESS
4) somewhere they ARE
5) something they DO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly