Test 3 Flashcards

(60 cards)

1
Q

What are the special “folders” that we create within Active Directory users and computers actually called?

A

Organizational Units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can be applied to the special “folders” within Active Directory users and computers to help control things like password policies and resource access rights?

A

Group Policy Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the full name for Microsoft’s patch management solution that is baked into Windows Server?

A

Windows Server Update Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What web server component gets installed along with Microsoft’s baked in patch management role?

A

IIS [Internet Information Services]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What command did we run to “push out” changes that we made to Active Directory policies?

A

gpupdate / force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Making sure those who should be able to access the data they need is known as this part of the CIA triangle…

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do each of the CIA letters stand for in the CIA triangle?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data integrity?

A

Making sure data has not been tampered with or erroneously altered; either purposefully or accidentally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the second A in the AAA of infosec and is the second step of what happens when you log into a machine

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is the type of “ticket” that windows Active Directory servers issue to a user when they authenticate; it is what is used to authorize access to devices and data

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a user enters in their username and password, it is this first A of the AAA of infosec

A

Authenication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This windows server role allows us to manage all phases of authentication, including password policies

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If I download a list of “known passwords” to use in a password attack, that list would be known as what?

A

Dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give me the two password settings that can prevent a user from re-using the same password

A

Minimum password age and password history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password “strength” is a measurement of these two variables

A

Length and complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The material that is contained in most UPS batteries…

A

Lead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The main vertical structures of a rack that support everything else are known as these; they come in 2 or 4 varieties…

A

Posts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

These are the horizontal metal pieces that the servers and other rack mountable devices actually attach to…

A

Rails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

These are the numbers that are written in the vertical structure pieces of a rack

A

Rack units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is the typical width of server racks; in fact, they will actually be referred to as ___ racks

A

19 inches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the name of the approach you should take to patch management?

A

One, some, many

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does mitigation mean?

A

Ways to reduce risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Software that tells a piece of hardware how it is to operate and requires a special process known as flashing to update it is known as…

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A Microsoft update that is securing against a vulnerability that could be used to spread an internet work would be given this rating…

A

Critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A vulnerability that, while not allowing the creation of a worm, may lead to the compromise of the CIA triangle would be given this Microsoft severity rating…
Inportant
26
Software that is no longer being supported is known.L to have reached this…
EOL [End of Life]
27
When you require an extra step for authentication beyond just the user’s password… a biometric could be one
Multifactor
28
A vulnerability whose exploitation is protected against by default configuration and auditing would probably be given this Microsoft severity rating
Moderate
29
These oft overlooked devices can be used as “bastion hosts” to launch further attacks against a network; please do make sure to patch and secure them…
Printers
30
The “new” type of surgical ion that we talked about in class. It may allow us to move beyond passwords, but it is currently struggling with vendor lock in issues
Passkeys
31
Giving users ONLY the permissions they need to get their job done is known as this technology concept…
Least privilege
32
To force a specific Lock Screen, you would need to configure a setting under this main section of a GPO
Computer settings
33
When setting permissions on the security tab in windows, yoh are said to be setting these filesystem permissions
NTFS
34
If I remove your ability to change your screensaver via group policy, it can be said that I remove a user ____ from your account
Right
35
Name the only time that an allow permission can override a deny permission with the appropriate terminology
When the deny is IMPLICIT and the allow is EXPLICIT
36
What a backup gets everything on a machine it is known as this type of backup…
Full
37
This type of backup backs up just files that have changed since the last backup; no matter what type of backup the previous one was
Incremental
38
Name the two storage appliance types that are anagrams and often use technologies like RAID and ISCSI to achieve a large amount of storage that can be network accessible for things like backup or running virtual machines from…
SAN or NAS
39
This type of backup will allow you to restore to a machine with a very similar hardware layout; in case a major component of your system dies
Bare metal
40
This Microsoft technology exposes a point-in-time snapshot of a drive so that things that are normally locked [like open files or running databases] can be backed up
Shadow copies
41
This technology is NOT a form of backup in itself, but might be used as a place to store backup files if configured with an appropriate level to achieve redundancy to provide fault tolerance
RAID
42
This type of backup gets everything that has been modified since the last full backup; no matter how many other types of backups have been run in between
Differential
43
This was a previous gold standard for large amounts of long term storage and is often still used by companies today for offsite archival purposes
Magnetic tape
44
If you are backing up “to the cloud”, then tech/business types would probably refer to it as this type of backup
Off prem
45
What is the 3,2,1 rule of backup?
3 copies of any important file, stored on 2 different types of storage media, and 1 copy should be stored off site
46
What f do it’s GPO stand for?
Group Policy Object?
47
Setting this password policy will force a user to have to change their password if it is older than the setting
Max password age
48
This is the name of the one “default” GPO that exists when you first setup Active Directory and applied across your entire domain
Default Domain Policy
49
This password setting includes that the user cannot use more than 2 consecutive characters from their first/last name or username
Password must meet complexity requirements
50
These are the two password policies you can set in a GPO that work together to thwart brute force and/or dictionary attacks
Lockout threshold and lockout duration
51
This is an exploit for which there currently is no patch available from the vendor
Zero day
52
These items that add functionality to your web browser often have vulnerabilities that are found within them abd should be patched regularly
Plug-ins or extensions
53
If I go public with proof of concept code without letting the vendor of the vulnerable program I just exploited know, I have practiced this
Unethical disclosure
54
If I prevent machines at my company from being exploited by disabling 16-but software support until Microsoft can release a patch, I have practiced one of these; 2 possible answers
Mitigating factors or workaround
55
This AV technology tries to identify threats which it does not have specific definitions or signature files for by suspect actions a piece of malware might be taking; like writing to kernel memory
Heuristics
56
This backup technology shrinks data that is stored in a storage medium down to a smaller size for storage/transmission in one of several ways
Compression
57
This backup technology aims to prevent storing multiple copies of the same file in backup sets to reduce overall storage needs
Deduplication
58
If you want to keep a new folder you just created from getting permissions from the folder that contains it then you need to do this…
Disable inheritance
59
If a user changes positions at you organization several times and never has their old permissions removed, they are getting these; no fault of their own
Creeping privileges
60
Microsoft has rebranded service packs to these new forms of a patch that contains all updates that have been released up until a certain point of time
Feature updates