Security + Lessons 1-5 Multiple Choice Questions and Answers
Anytime you use a password, you should make it ________. constantly changing migrating strong simple
Answer: strong
What directory service is used with Windows domains? Active Directory E-Directory PAM Kerberos
Answer: Active Directory
Which of the following is not a complex password? Platter*SAN John!Taylor Password01 ThereisTimetoLive&Die
Answer: John!Taylor
What authentication type is the defualt for Active Directory? NTKM Kerberos MS-CHAP MS-CHAPv2
Answer: Kerberos
Which authentication sends the username and password in plain text? MS-CHAP CHAP PAP SPAP
Answer: PAP (Password Authentication Protocol)
Which of the following is a secret numeric password used for authentication? security token digital certificate digital signature PIN
Answer: PIN
When you create a local user on a computer running in Windows 7, where is the user account stored? Active Directory SAM PAN SQL database
Answer: SAM (Security Account Manager)
Which concept determines what resources users can access after they log on? authentication auditing access control defense in depth
Answer: access control
What settings are used to keep track of incorrect logon attempts and lock the account if too many attempts are detected within a certain time set? account lockout password policy authentication tracker user parameters
Answer: account lockout
What is the process of keeping track of a user's activity? authentication authorization accounting authoring
Answer: accounting
What do you call the scope that hacker can use to break into a system? defense in depth attack surface principle of least privilege risk mitigation
Answer: attack surface
What is used to verify that an administrator is not accessing data that he should not be accessing? authentication encryption access control auditing
Answer: auditing
What technology is not used to implement confidentiality? encryption access controls auditing authentication
Answer: auditing
What do you call the process in which a user is identified via a username and password? authentication authorization accounting auditing
Answer: authentication
What is the process of identifying an individual? authentication authorization accounting auditing
Answer: authentication
What is used to identify a person before giving access? authentication encryption access control auditing
Answer: authentication
What is the process of giving individual access to a system or resource? authentication authorization accounting auditing
Answer: authorization
What type of authentication method identifies and recognizes people based on physical traits such as fingerprints? digital certificates WEP biometrics RADIUS
Answer: biometrics
What do you call a password that is at least seven characters long and uses three of the following categories (uppercase, lowercase, numbers, and special characters)? healthy password migrating password standard password complex password
Answer: complex password
Which of the following terms indicates that information is to be read only by those people for whom it is intended? confidentiality integrity availability accounting
Answer: confidentiality
What is used to provide protection when one line of defense is breached? defense in depth attack surface principle of least privilege risk mitigation
Answer: defense in depth
What type of electronic document contains a public key? digital certificate biometrics PIN PAN
Answer: digital certificate
What type of server runs Active Directory? member server file server domain controller NTLAN server
Answer: domain controller
What is the best way to protect against social engineering? stronger encryption stronger authentication employee awareness risk mitigation
Answer: employee awareness
What is the processs of converting data into a format that cannot be read by another user? encryption locking keying registering
Answer: encryption
What type of permissions are assigned directly to a file or folder? explicit inherited encompassing overriding
Answer: explicit
What do you use to define how long a password is in Windows? registry Users applet in the Control Panel group policies NTFS files
Answer: group policies
When you access permissions to a folder, you should first grant permissions to ___________ rather than users. groups computers collections organizational units
Answer: groups
Which of the folllowing makes sure that data is not changed when it not supposed to be? confidentiality integrity availability accounting
Answer: integrity
What is a physical or logical device used to capture keystrokes? USB flash drive PDA Smartphone keylogger
Answer: keylogger
What setting forces users to change their password? minimum password age maximum password age password history account lockout
Answer: maximum password age
What prevents users from changing a password multiple times so that they can change it to their original password? minimum password age maximum password age password history account lockout
Answer: minimum password age
What is needed to highly secure a system? lost in time more money system update disabled administrator account
Answer: more money
What process prevents someone from denying that she accessed a resource? accounting authorization sniffing nonrepudiation
Answer: nonrepudiation
What settings are used to prevent users from reusing the same password over and over? minimum password age maximum password age password history account lockout
Answer: password history
Which of the followinf is not a response when dealing with a risk? avoidance mitigation transfer patching
Answer: patching
When you grant access to print to a printer, what are you granting? right permission accessible key
Answer: permission
What is the first line of defense when setting up a network? physically secure the network configure authentication configure encryption configure an ACL
Answer: physically secure the network
What do you call the security discipline that requires that a user is given no more privilege necessary to perform his or her job? defense in depth reduction of attack surface risk transfer principle of least privilege
Answer: principle of least privilege
What type of device can be easily lost or stolen or can be used for espionage? processors RAM chips removable devices servers
Answer: removable devices
What authorizes a user to perform certain actions in Windows such as logging on or performing a backup? right permission accessible key
Answer: right
In dealing with risks, which response is done by buying insurance to protect your bottom line if such a disaster or threat is realized? risk avoidance risk acceptance risk mitigation risk transfer
Answer: risk transfer
Which type of group can be granted rights and permissions? security distribution authorizing SAM
Answer: security
What item, about the size of a credit card, allows access to a network and its resources? digital certificate smart card security token biometric
Answer: smart card
What method used by a hacker relies on the trusting nature of the person being attacked? social engineering attack surface principle of least privilege risk avoidance
Answer: social engineering
In Windows, what do you use ro enable auditing? registry group policies NTFS permissions access log
NTFS permissions
What type of attack tries to guess passwords by trying common words? dictionary attack brute-force attack man-in-the-middle attack smurf attack
dictionary attack
What is the most common form of authentication? password PIN digital certificates smart cards
Answer: password
Where are users and permissions stored for an NTFS folder? access log access file registry ACL
Answer: registry
