Microsoft Security Flashcards

1
Q

Describe an IPv4 address

A

An IPv4 address is composed of four numbers divided by dots. Each number is called an octet. The value of each octet can be between 0 and 255.

Ex. 192.168.26.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a class A Subnet Mask, Prefix and Range?

A

Subnet mask: 255.0.0.0
Prefix:/8
Range: 1.0.0.0 to 126.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a class B Subnet Mask, Prefix and Range?

A

Subnet mask: 255.255.0.0
Prefix: /16
Range: 128.0.0.0 to 191.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a class C Subnet Mask, Prefix and Range?

A

Subnet mask: 255.255.255.0
Prefix: /24
Range: 192.0.0.0to 223.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the Private IPv4 Address ranges

A
  1. 0.0.0 –10.255.255.255
  2. 16.0.0 –172.31.255.255
  3. 168.0.0 –192.168.255.255
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do we have IPv4 private addresses?

A

They are used to delay the depletion of IPv4addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can IPv4 private address be used to directly communicate over the internet?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a static IP address?

A

It is a manually configures IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where are static IP addresses used?

A

Servers use static IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe a Default Gateway

A
  • -A gate through which data passes on its way to or from other networks
  • -Can be a router, computer, or server
  • -The machine used as a gateway can also serve as a firewall and proxy server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the DNS?

A
    • Used for Name-to-number (IP address) mapping

- -Typically installed on the domain controller (DC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does DHCP do?

A

It dynamically assigns an IP address and other network configuration parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VM Network Adapter:

–NAT mode

A
  • -In NAT mode, a guest operating system on a virtual machine (VM) cannot access hosts in a physical LAN but can on the internet.
  • -A guest machine will not be accessible from a host machine or from other machines in the network.
  • -NAT is the default mode.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VM Network Adapter:

–NAT Network

A
  • -In NAT network mode, a guest operating system on a VM can access hosts in a physical local area network (LAN) and on the internet.
  • -A guest machine will not be accessible from a host machine or from other machines in the network.
  • -The VM must have a unique IP address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VM Network Adapter:

–Bridged Mode

A
  • -In bridged mode, a VM’s virtual network adapter is connected to a physical network.
  • -Packets are sent and received directly to/from the virtual network adapter without additional routing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VM Network Adapter:

–Internal Mode

A
  • -In internal mode, VMs are connected to an isolated virtual network.
  • -The VMs can communicate with each other but not with the host machine or any other host in a physical or external network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Windows Device Manager

A

The manager provides a view of the hardware components connected to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Windows Event Manager

A

It is an administrative tool that displays logs and system messages regarding events that occur in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Windows Network Center

A

The center enables network interface card (NIC) configuration, including IP address assignment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name types of Windows users

A

Guest, Standard, Administrator, NT Authority

21
Q

What is a domain?

A
  • -Central management: One or more servers manage and control all computers and users.
  • -Users are stored in a central database and can log on from any computer in the domain.
22
Q

What is a workgroup?

A
  • -Default settings for Windows
  • -Computers are self-managed.
  • -Users are stored in a local database in each computer.
23
Q

What do domain controllers do?

A

Domain controllers (DCs) control access to resources in a domain. Servers that are domain members have resource access managed by a DC. Client authentication is managed by the DC.

24
Q

What is a guest user?

A
  • -Guest users canuse the Windows system.
  • -Windows doesnot recognize the guest user by name,but as guest.
  • -Guest users are like standard users and can perform the same operations in the system.
  • -However, guest users lack privacy.
  • -For example, any changes one guest makes to the desktop can be seen by anyone else who logs into the guest account.
25
Q

What is a standard user?

A
  • -Standard users are the basic accounts for normal, everyday use of a Windows system.
  • -Standard users can access most of the system functions, but they cannot make any major changes to the settings. For example, standard users cannot run or install new programs.
26
Q

What is an administrator?

A

The administrator user can introduce different changes to the Windows system that will affect other users who use the system (standard users). For example, it can control which applications and programs are installed on the system.

27
Q

What is NT Authority?

A
  • -This account, also known as a system account, is the most privileged account, and has unrestricted access to local system resources, such as services running on the system.
  • -This user cannot be managed by other accounts.
28
Q

What utility is used to add new users and groups in CMD shell?

A

net.exe

29
Q

What is User Access Control (UAC)?

A

This feature limits the execution of applications on the system for users with insufficient privileges.

30
Q

What tis BitLocker?

A

It provides full drive encryption to prevent unauthorized access to the protected drive.

31
Q

What is Remote Desktop Protocol?

A

This protocol provides a graphical interface to connect to another desktop.
By default, the port used for RDP is 3389 over TCP or UDP; however, since the introduction of Windows 7, this protocol is turned off by default.
It also poses, in some cases, a security risk when not managed and configured properly.

32
Q

How do you enable Remote Desktop?

A

Through the Control Panel Advanced System Settings

33
Q

What is a Domain?

A

A domain provides centralized management to manage and control all computers and users within an organization. Users within a domain are stored in a central database, which allows login from any computer in the domain. In a domain, several computers can be part of different local networks.

34
Q

What is a Workgroup?

A

In a workgroup, computers are self-managed, which means no computer has control over other resources in the network like in a domain. Users within a workgroup are stored locally, so users can log in only for the computers they are registered to. All computers in a workgroup must be on the same local network or subnet.

35
Q

Domain Structure usually contains what components?

A
  • -A DC Server, or Domain Controller
  • -Other servers
  • -Clients
36
Q

What is a Domain Controller, or DC server?

A

A domain controller is a server that is running Active Directory Domain Services (AD DS). A domain controller also runs other key components, such as LDAP services, network time service, and an authentication protocol (usually Kerberos).

37
Q

What are Active Directory Domain Services

A

AD DS manages the authentication of users and other objects on the network and enforces the defined policies of various objects within the domain. One simple example is the password policy.

38
Q

What does DNS do?

A

Provides resolution of a human-readable address (URL) into an IP address, which is used for routing

39
Q

What does DHCP do?

A

Leases IP addresses to devices that want to connect to the network.

40
Q

What is the GPMC?

A

It’s a built-in administration tool allowing administrators to manage group policies.

41
Q

What is a FS?

A

A FS provides users in a domain with storing and sharing file services.

42
Q

What is Hardening?

A

Securing a system or network

43
Q

Should LLMNR be turned off and why or why not?

A

Yes because it is a legacy system.

44
Q

Should NetBIOS be disabled and why or why not?

A

It depends on the system. NetBios is still used for a lot.

45
Q

What does the SMB do?

A

?

46
Q

What is SMB signing?

A

The SMB protocol is used to share resources over the network and is common in a
domain environment for file sharing purposes. It permits applications to request
services from server programs on a computer network and also to read from and write
to files. SMB signing provides digital signatures for SMB packets and helps avoid issues
such as tampering with packets and Man-in-the-Middle attacks. It is available on all
Windows versions since 2000 and is enabled by default on domain controllers.

47
Q

Where is account policy, such as password policy, set?

A

GPMC

48
Q

What are local policies?

A

The local security policy on a system includes information about the security on a local computer. Local polices store permissions and restrictions associated with the station.
Via local policy, one can manage the login options, allowed user actions, and other
security settings for a local machine

49
Q

Do access policies apply to Remote Desktops?

A

No, they are managed by separate policies.