Week 2 - Users and Groups Flashcards

1
Q

Different between standard user, admin, groups?

A

standard user: limited access, can’t install software or change certain settings
admin: complete control, can view every file and account
groups: users grouped by access level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What application do you use to view user and group information? W

A

Computer management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s a Windows domain? What’s included?

A

a network of computers, users, and files that are configured on a central database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does UAC stand for? What does it do?

A

User Access Control

It prevents unauthorized changes to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Do you have to be logged in all the time as an administrator? What makes this possible?

A

No, don’t have to be logged in as Admin can be logged in on your acccount

UAC helps make this possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What command lets you quickly see a list of users on the computer?w

A

Get-LocalUser

(useful to check if admin is turned on for that computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command lets you quickly see a list of groups on the computer? w

A

Get-LocalGroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What windows command lets you see who is in a certain group?

A

Get-LocalGroupMember (group name)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 windows commands to see user and group permissions?

A
  1. Get-LocalUser
  2. Get-LocalGroup
  3. Get-LocalGroupMember (group name)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a root user in Linux?

A

A root user is the first default superuser that is created when an OS is installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is always being logged into an admin or root account dangerous?

A

There are many important files that could be accidentally deleted or modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does sudo mean? l

A

sudo means superuser do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where in a command do you place sudo?l

A

at the front

sudo cat /home/users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When would you have to use sudo?l

A

When you want to access a root-restricted file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does su mean? L

A

substitute user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the function of su? What happens when you use it? L

A

this changes you to a different user, if none is specified then it goes to root by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do you view memberships for all groups in Linux? Find out who can access run sudo?

A

cat /etc/group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the 4 fields when viewing memberships for groups on Linux?

A
  1. group name
  2. group password
  3. group ID
  4. users in the group
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What’s the file path of the location of the file that contains user information (local)? linux

A

cat /etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do you tell Bash you want to run a command as root? 2

Trying to run /etc/sudoers but permission error

A

sudo /etc/sudoers
or
sudo su - (changes you to the substitute default root user) then run the command again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Since computers don’t identify a group or user by its name, how does it identify them?

A

Group or User IDs (UID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do you view a root-restricted file?

A

sudo cat /file/location

or

sudo su -
then cat filelocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How would you use the substitute user command to run a root-restricted file?

A

sudo su -

then run the restricted file command again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is root’s UID?

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why do so many users pop up when we use /etc/password to view users on our local machine?

A

There are a lot of processes constantly running that our computer needs to associate with a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the 3 main relevant fields in the standard output of cat /etc/passwd?

A
  1. user name
  2. user password
  3. user ID(UID)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How do you set a password for a user manually on the GUI?
Windows

A

computer management > right click user > click set password

28
Q

What Windows command lets you change a local user password?

A

net

29
Q

What are two ways to use a command line to change a password? Windows

A

net user ‘set_password’
net user *

30
Q

Which method is better for changing a user password when required to change it manually? Windows

A

net user *

is better because if you type your password out it’s going to be included in the log file in the central database and also prevents wandering eyes from seeing your new password

31
Q

What’s the windows command to force a user to change their password at next logon?

A

net user vanes /logonpasswordchg:yes

32
Q

in Windows, what makes up a strong password? 5 things

A
  1. lowercase letters
  2. uppercase letters
  3. non-alphanumeric symbols
  4. Unicode
  5. numerals
33
Q

What are “hashes”?

A

password representations

34
Q

What does LM hash mean?

A

LAN Manager hash

35
Q

What are the two types of hashes? (password represenations) W

A
  1. LAN Manager (LM)
  2. NTLM
36
Q

Why are there 2 types of hashes? W

A

to continue backward compatibility with older OS and older applications like Windows 98

37
Q

How is the MD4 hash generated?

A

It takes the plain text password and generates a MD4 hash from it

38
Q

What does MD4 stand for?

A

Message Digest 4

39
Q

What is the SAM database? Windows

A

(local) Security Accounts Manager database

40
Q

What does concatenate mean?

A

To bind or join together

41
Q

Which hash is more resistant to brute force attacks?

A

The NTLM hash is much more resistant to brute force attacks than the LM hash

42
Q

What is an offline brute force attack?

A

Similar to dictionary attacks but doesn’t use passwords included in the text file used in those attacks

attacker uses an automated program that generates hashes or encrypted values for all possible passwords and compares them to the values in the password file.

43
Q

What is an offline dictionary attack?

A

Attacker gets offline copy of file where the password is stored and uses an automated program to crack the password (very quickly)

44
Q

What is an online dictionary attack?

A

Attacker has a text file with a list of words and uses an automated program that repeatedly tries to log on using those words

45
Q

What is entropy?

A

state of disorder. random.

46
Q

what is password entropy?

A

random in range and order of the characters to make it harder to crack

47
Q

What are 3 methods to make a brute force attack-resistant password?

A
  1. Use ALT key combos
  2. Do not start with the top keyboard row alphanumeric symbols !@#$%^&*()_+=
  3. Do not place symbol entropy in the 8th position as only entropy
48
Q

What type of account would need a very secure password?

A

domain administrator

using Unicode characters

49
Q

How do you enter unicode characters? On PC and laptop
Windows

A

ALT + 3-4 digit number

laptop: FN + ALT + 3-4 digit number

50
Q

Do any unicode characters make a password weaker? Why?

A

Yes, they are converted into ASCII characters

51
Q

After how long should passwords be changed?

A

42 days

52
Q

How do you identify what computer OS are in use in your organization? How do you find that info on a computer?
Windows

A

Start > Run > Open > winver.exe > OK > Version # displayed

53
Q

Which OS supports 128 characters and ALT Key combos? 4

Windows

A

Windows NT 4.0, Windows 2000, Windows XP, Windows Server 2003

54
Q

What OS supports spaces in your password? windows

A

Windows NT 4.0, Windows 2000, Windows XP, Windows Server 2003

55
Q

What are 5 tips for making a password secure?

A
  1. Don’t be afraid to make it long by using a pass phrase
  2. Use the first letter of each word in a phrase
  3. Replace letters with alphanumeric symbols
  4. Avoid using complete words
  5. Choose public or personal upcoming events to make it easier to remember mixed with symbols
56
Q

What are the 4 don’ts when making passwords?

A
  1. Don’t create similar ones to previously used ones
  2. Don’t use words that are spelled forward or backward in any language
  3. Don’t use personal information
  4. Don’t tie the password to the month
57
Q

What’s the command to change your password in Linux?

A

passwd

58
Q

In which location is a scrambled Linux password stored?

A

/etc/shadow

59
Q

What does the -e flag mean when applying it to passwords?

windows

A

-e = expire

60
Q

What should you do immediately after creating a user or changing a user’s password manually?

windows

A

Force them to change their password on next logon with:

net user username /logonpasswordchg:yes

61
Q

How do you add a new local user command?
windows

A

net user username * /add

then

net user username /logonpasswordchg:yes

62
Q

How do you add a new local user and require next logon password change in one command line?
windows

A

net user username pa5sw0rd /add /logonpasswordchg:yes

63
Q

What are 2 ways you can remove a user in Windows?

A
  1. net user username /del
  2. Remove-LocalUser username
64
Q

How do you add a user on Linux?

A

sudo useradd username

65
Q

How do you force a password change on logon in Linux?

A

sudo passwd -e username

66
Q

How do you delete a user on Linux?

A

sudo userdel username

67
Q

What are mobile device management policies?

A

apply and enforce rules about how device has to be configured

require mobile devices to be locked