Windows Security Policy Flashcards

(45 cards)

1
Q

foundational principles that guide the design, implementation, and management of security measures to protect information systems and data

A

security concepts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1) Ensures sensitive information is accessible only to authorized individuals
2) Ensures data remains accurate, consistent, and unaltered
3) Ensures systems and data are accessible when needed by authorized users

A

confidentiality;
integrity;
availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A layered security approach that employs multiple security measures to protect information and resources within the organization

A

defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Prioritizing and integrating security measures into the development and design of systems and software

A

security by design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ensures that the default software configuration settings are the most secure settings possible

A

security by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An integrated antivirus and anti-malware solution that provides real-time protection against threats such as viruses, spyware, and other malicious software;
enhanced threat detection & response

A

Windows Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules;
Inbound and outbound rules to control network traffic

A

Windows Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a centralized database used to store configuration settings for the OS, hardware, software, and user preferences;
Organized in a hierarchical structure where each top-level node is called a _____

A

Registry hive; hive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fundamental components that act as containers for subkeys and values that store configuration settings;
help store settings for the operating system, applications, and hardware

A

registry keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Similar to folders in a file system, they can contain subkeys and values;
subkeys are nested within other keys
values are data entries stored within keys, each having name, type, & data

A

Hives/keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MASTER KEY (1/2);
registry key that contains configuration information for the local machine, including hardware, software, and system settings

A

HKEY_LOCAL_MACHINE (HKLM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MASTER KEY (1/2);
Stores user-specific settings for all users’ profiles on the system;
each user profile is represented by a subkey named after the user’s Security Identifier (SID)

A

HKEY_USERS (HKU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stores settings and preferences for the currently logged-in user, such as desktop settings and user-specific software configurations;
derived key (1/3)

A

HKEY_CURRENT_USER (HKCU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Holds information about file associations and registered COM Objects; merges information from HKLM\Software\Classes and HKCU\Software\Classes;
derived key (1/3)

A

HKEY_CLASSES_ROOT (HKCR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Contains hardware configuration information used at system startup. It points to the current hardware profile settings in HKLM\SYSTEM\CurrentControlSet\
derived key (1/3)

A

HKEY_CURRENT_CONFIG (HKCC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

**the actual data entries within Registry keys that store configuration settings and other necessary information for the operating system and applications;
each contains all 3 components of Name, Type, & Data

A

Registry values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

**A fixed-length text string

A

String Value (REG_SZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

**used for configuration settings and flags;
32-bits

A

DWORD Value (REG_DWORD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

**hardware component information;
binary data

A

Binary Value (REG_BINARY)

19
Q

**A variable-length string that can contain environment variables that are expanded when the value is retrieved

A

Expandable String Value (REG_EXPAND_SZ)

19
Q

**used for more extensive data storage;
64 bit

A

QWORD Value (REG_QWORD)

20
Q

**A sequence of null-terminated strings, used for lists of items

A

Multi-String Value (REG_MULTI_SZ)

21
Q

**utilities and applications designed to access, view, edit, and manage the Windows Registry;
help users configure system settings, manage policies, and troubleshoot issues

A

Windows Registry tools

22
Q

**command-line utility that allows users to interact with the Windows Registry by querying, adding, modifying, and deleting registry keys and values;
enables exporting, importing, adding, deleting, and modifying registry keys and values through the command prompt

A

Command-Line Tools (reg.exe)

reg query- Retrieve registry data from specified keys or values
reg add- Add a new registry key or value
reg delete
reg export or import

22
**A management console used to configure local policies on the computer & enforce them, including registry settings; used in enterprise environments for controlling user and computer policies
Group Policy Editor (gpedit.msc)
22
**A graphical tool for viewing and editing the Windows Registry; Allows users to navigate the Registry tree, create, modify, and delete keys and values; provides a Graphical User Interface (GUI) to navigate the hierarchical structure of the Registry
Registry Editor (regedit.exe)
23
specialized commands for managing registry data;
cmdlets
23
advanced scripting capabilities to interact with the Windows Registry; cmdlets; scripting; pipelining
PowerShell
24
**way to protect files; protects critical system files (such as .dll, .exe, .sys files) and specific registry keys essential for the operating system’s proper functioning; 5 key components
Windows Resource Protection (WRP); Access Control List (ACLs), System File Checker (SFC), TrustedInstaller Service, File Protection & Registry Protection
25
scans and verifies the integrity of all protected system files
System File Checker (SFC)
26
___ ___ and keys cannot be changed by most applications, including malware, ensuring the integrity of the operating system
protected files
27
____ ____ are foundational principles that guide the design, implementation, and management of security measures to protect information systems and data
security concepts
28
Availability can sometimes be referred to as
denial prevention
28
the overall security strength and resilience against cyber threats; security measures implemented within a system to protect against vulnerabilities and threats
Windows System Security Posture
29
a collection of settings in Windows that can be used to establish a security auditing system for your local computer or the entire network; help identification, improvement, investigation, & review
audit policy
30
Audit policies include ____, which are generated by the auditing system to capture activity data, & _____, which are recorded details about user actions, system changes, and access attempts
logs & events
31
What are the common forms of persistence within the Windows Registry
Run and RunOnce Keys, services, scheduled tasks
32
32-bit number, often used for config settings and flags
DWORD Value (REG_DWORD)
33
variable-length string that can contain environment variables
expandable string value (REG_EXPAND_SZ)
34
a fixed length text string
string value (REG_SZ)
35
a sequence of null-terminated strings, used for a list of items
multi-string value (REG_MULTI_SZ)
36
raw binary data, used for hardware component information
binary value (REG_BINARY)
37
owns and protects critical system files and registry keys
TrustedInstaller Service
38
a component of the Windows Registry that contains user-specific settings for all users' profiles on the system
HKU
39
real-time protection against threats, regular updates, and cloud-based protection
Windows Defender