Shared Flashcard Set

Details

Security FUNdamentals 2
sdas
28
Computer Networking
11th Grade
04/06/2015

Additional Computer Networking Flashcards

 


 

Cards

Term
1. What is the process of identifying an individual?
a) authentication
b) authorization
c) accounting
d) auditing
Definition
Answer: a
Difficulty: Easy
Section Reference: Starting Security with Authentication
Explanation: In the world of information security, AAA (authentication, authorization, and accounting) is a leading model for access control. Here, authentication is the process of identifying an individual. After a user is authenticated, she can access network resources based on her authorization.
Term
2. What do you call the process in which a user is identified via a username and password?
a) authentication
b) authorization
c) accounting
d) auditing
Definition
Answer: a
Difficulty: Easy
Section Reference: Starting Security with Authentication
Explanation: Authentication is the process of identifying an individual, usually based on a username and password. After a user is authenticated, he can access network resources based on his authorization.
Term
3. What is the process of giving individual access to a system or resource?
a) authentication
b) authorization
c) accounting
d) auditing
Definition
Answer: b
Difficulty: Easy
Section Reference: Starting Security with Authentication
Explanation: Authorization is the process of giving individuals access to system objects based on their identities. Of course, before authorization is to occur, authentication must occur.
Term
4. What is the process of keeping track of a user’s activity?
a) authentication
b) authorization
c) accounting
d) authoring
Definition
Answer: c
Difficulty: Easy
Section Reference: Starting Security with Authentication
Explanation: Accounting, also known as auditing, is the process of keeping track of a user’s activity while accessing network resources, including the amount of time spent in the network, the services accessed while there, and the amount of data transferred during each session.
Term
5. What process prevents someone from denying that she accessed a resource?
a) accounting
b) authorization
c) sniffing
d) nonrepudiation
Definition
Answer: d
Difficulty: Easy
Section Reference: Starting Security with Authentication
Explanation: Nonrepudiation prevents one party from denying the actions it has carried out. If you have established proper authentication, authorization, and accounting, appropriate mechanisms of nonrepudiation should be in place, and no user should be able to deny the actions she has carried out while in your organization’s system.
Term
6. Which of the following is a secret numeric password used for authentication?
a) security token
b) digital certificate
c) digital signature
d) PIN
Definition
Answer: d
Difficulty: Easy
Section Reference: Using a Personal Identification Number (PIN)
Explanation: A personal identification number (PIN) is a secret numeric password shared between a user and a system that can be used to authenticate the user to the system. Because they consist of only digits and are relatively short (usually four digits), PINs are used for relatively low-security scenarios, such as gaining access to a system, or in combination with another method of authentication.
Term
7. What type of electronic document contains a public key?
a) digital certificate
b) biometrics
c) PIN
d) PAN
Definition
Answer: a
Difficulty: Easy
Section Reference: Authentication with What You Own or Possess
Explanation: A digital certificate is an electronic document that contains an identity, such as a user or organization name, along with a corresponding public key. Because a digital certificate is used to prove a person’s identity, it can also be used for authentication.
Term
8. What item, about the size of a credit card, allows access to a network and its resources?
a) digital certificate
b) smart card
c) security token
d) biometric
Definition
Answer: b
Difficulty: Easy
Section Reference: Authentication with What You Own or Possess
Explanation: A smart card is a pocket-sized card with embedded integrated circuits consisting of nonvolatile memory storage components and perhaps dedicated security logic. Nonvolatile memory is memory that does not forget its content when power is discontinued. This kind of memory may contain digital certificates to prove the identity of the person who is carrying the card, and it may also contain permissions and access information.
Term
9. What type of authentication method identifies and recognizes people based on physical traits such as fingerprints?
a) digital certificates
b) WEP
c) biometrics
d) RADIUS
Definition
Answer: c
Difficulty: Easy
Section Reference: Authentication with What You Are
Explanation: Biometrics is an authentication method that identifies and recognizes people based on physical traits, such as fingerprints, facial recognition, iris recognition, retinal scans, and voice recognition. Many mobile computers include a finger scanner. Installing biometric devices on doors and cabinets is relatively easy to ensure that only authorized people enter secure areas.
Term
10. What authentication type is the default for Active Directory?
a) NTLM
b) Kerberos
c) MS-CHAP
d) MS-CHAPv2
Definition
Answer: b
Difficulty: Medium
Section Reference: Introducing Directory Services with Active Directory
Explanation: Kerberos is the default computer network authentication protocol that allows hosts to securely prove their identity over a nonsecure network. It can also provide mutual authentication so that both the user and server verify each other’s identity. To ensure security, Kerberos protocol messages are protected against eavesdropping and replay attacks.
Term
11. What directory service is used with Windows domains?
a) Active Directory
b) E-Directory
c) PAM
d) Kerberos
Definition
Answer: a
Difficulty: Easy
Section Reference: Introducing Directory Services with Active Directory
Explanation: A directory service stores, organizes, and provides access to information in a directory. It is used for locating, managing, and administering common items and network resources, such as volumes, folders, files, printers, users, groups, devices, telephone numbers, and other objects. One popular directory service used by many organizations is Microsoft’s Active Directory.
Term
12. What type of server runs Active Directory?
a) member server
b) file server
c) domain controller
d) NTLAN server
Definition
Answer: c
Difficulty: Easy
Section Reference: Introducing Directory Services with Active Directory
Explanation: A domain controller is a Windows server that stores a replica of the account and security information of a domain and defines the domain boundaries. To make a computer running Windows Server 2008 a domain controller, you first have to install Active Directory Domain Services. You will then have to execute the dcpromo (short for dc promotion) command to make the server a domain controller from the Search Programs and Files dialog box or from the command prompt.
Term
13. When you access permissions to a folder, you should first grant permissions to __________ rather than users.
a) groups
b) computers
c) collections
d) organizational units
Definition
Answer: a
Difficulty: Easy
Section Reference: Using Groups
Explanation: A group is a collection or list of user accounts or computer accounts. Different from a container, a group does not store users or computers; rather, it just lists them. Using groups can simplify administration, especially when assigning rights and permissions.
Term
14. When you create a local user on a computer running in Windows 7, where is the user account stored?
a) Active Directory
b) SAM
c) PAN
d) SQL database
Definition
Answer: b
Difficulty: Medium
Section Reference: Examining Users
Explanation: A user account allows users to log on and gain access to the computer where the account was created. The local user account is stored in the Security Account Manager (SAM) database on the local computer. The only Windows computer that does not have a SAM database is the domain controller.
Term
15. Which type of group can be granted rights and permissions?
a) security
b) distribution
c) authorizing
d) SAM
Definition
Answer: a
Difficulty: Easy
Section Reference: Using Groups
Explanation: Windows Active Directory employs two types of groups: security and distribution. A security group is used to assign rights and permissions and to gain access to network resources. It can also be used as a distribution group. A distribution group is used only for nonsecurity functions, such as distributing email, and it cannot be used to assign rights and permissions.
Term
16. What authorizes a user to perform certain actions in Windows such as logging on or performing a backup?
a) right
b) permission
c) accessible
d) key
Definition
Answer: a
Difficulty: Easy
Section Reference: Comparing Rights and Permissions
Explanation: A right authorizes a user to perform certain actions on a computer, such as logging on to a system interactively or backing up a system’s files and directories. User rights are assigned through local policies or Active Directory group policies.
Term
17. When you grant access to print to a printer, what are you granting?
a) right
b) permission
c) accessible
d) key
Definition
Answer: b
Difficulty: Easy
Section Reference: Comparing Rights and Permissions
Explanation: A permission defines the type of access granted to an object (an object can be identified with a security identifier) or object attribute. The most common objects assigned permissions are printers, NTFS files and folders, and Active Directory objects.
Term
18. Where are users and permissions stored for an NTFS folder?
a) access log
b) access file
c) registry
d) ACL
Definition
Answer: c
Difficulty: Medium
Section Reference: Comparing Rights and Permissions
Explanation: Information about which users can access an object and what they can do is stored in the access control list (ACL), which lists all users and groups that have access to an object.
Term
19. What type of permissions are assigned directly to a file or folder?
a) explicit
b) inherited
c) encompassing
d) overriding
Definition
Answer: a
Difficulty: Easy
Section Reference: Looking at Effective NTFS Permissions
Explanation: NTFS uses two types of permissions. Explicit permissions are granted directly to a file or folder, whereas inherited permissions are granted to a parent object and flow down to child objects.
Term
20. What is the process of converting data into a format that cannot be read by another user?
a) encryption
b) locking
c) keying
d) registering
Definition
Answer: a
Difficulty: Easy
Section Reference: Using Encryption to Protect Data
Explanation: Encryption is the process of converting data into a format that cannot be read by another user. After a file is encrypted, it automatically remains encrypted when stored on disk. Decryption is the process of converting data from encrypted format back to its original format.
Term
21. Which authentication sends the username and password in plain text?
a) MS-CHAP
b) CHAP
c) PAP
d) SPAP
Definition
Answer: c
Difficulty: Medium
Section Reference: Encrypting with VPN Technology
Explanation: Password Authentication Protocol (PAP) uses plain text (unencrypted passwords). PAP is the least secure form of authentication and is not recommended.
Term
22. In Windows, what do you use to enable auditing?
a) registry
b) group policies
c) NTFS permissions
d) access log
Definition
Answer: c
Difficulty: Medium
Section Reference: Using Auditing to Complete the Picture
Explanation: Auditing is not enabled by default in Windows. To enable auditing, you must specify what types of system events to audit by using group policies or the local security policy (Security Settings\Local Policies\Audit Policy).
Term
23. By default, the ____________ group has full access to all resources within a domain?
Definition
Answer: Domain Admins
Difficulty: Medium
Section Reference: Using Built-in Groups
Explanation: Members of the Domain Admins group can perform administrative tasks on any computer within the domain. By default, the Administrator account is a member.
Term
24. _____________ allows you to log on once and access multiple related by different systems without having to log on again.
Definition
Answer: Single sign-on (SSO)
Difficulty: Medium
Section Reference: Introducing Directory Services with Active Directory
Explanation: Single sign-on (SSO) allows you to log on once and access multiple related but independent software systems without having to log on again. As you log on with Windows via Active Directory, you are assigned a token, which can then be used to log on to other systems automatically.
Term
25. _______________ is the term used to describe two or more authentication methods used to authenticate someone.
Definition
Answer: Multifactor authentication
Difficulty: Medium
Section Reference: Starting Security with Authentication
Explanation: When two or more authentication methods are used to authenticate someone, a multifactor authentication system is said to be in place. Of course, a system that uses two authentication methods (such as smart cards and passwords) can be referred to as a two-factor authentication system.
Term
26. ______________ is the standard for logging program messages for UNIX and Linux machines.
Definition
Answer: Syslog
Difficulty: Hard
Section Reference: Using Auditing to Complete the Security Picture
Explanation: If you need to audit non-Microsoft products, you may need to use Syslog, standard for logging program messages that can be accessed by devices that would not otherwise would not have a method for communication. Cisco firewalls and routers, computers running Linux and UNIX, and many printers can use Syslog. It can be employed for computer system management and security auditing, as well as for generalized information, analysis, and debugging messages.
Term
27. What is the most common form of authentication?
Definition
Answer: password
Difficulty: Easy
Section Reference: Starting Security with Authentication
Explanation: For both individual computers and entire networks, the most common method of authentication is the password. A password is a secret series of characters that enables a user to access a particular file, computer, or program.
Term
28. You are told that you should not log on to your local computer running Windows 7 as a domain administrator. However, some tools run only as a domain administrator. What should you do?
Definition
Answer: Log on with your normal user account and use RUNAS to run those tools.
Difficulty: Hard
Section Reference: Using Run As
Explanation: Because administrators have full access to individual computers or entire networks, it is recommended that you use a standard non-administrator user account to perform most tasks. Then, when you need to perform administrative tasks, you can use the Run as command or the options built into the Windows operating system.
Supporting users have an ad free experience!