Cybersecurity Basics Quiz
43 Questions
101 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is the strongest password? (Select all that apply)

  • Thisisverysecure
  • A.!OCRAIN#
  • This1sV#rys3cure (correct)
  • Marq1sD3S0d
  • Which of these is a security component of Windows?

  • UPS
  • CONTROL PANEL
  • UAC (correct)
  • GADGETS
  • What key combination helps to secure the logon process?

  • CTRL+ALT+DEL (correct)
  • CTRL+SHIFT+ESC
  • ALT+F4
  • WINDOWS=R
  • Which of the following is the most common authentication model?

    <p>USERNAME AND PASSWORD</p> Signup and view all the answers

    Which of the following access control methods uses rules to govern whether object access will be allowed?

    <p>RULE-BASED ACCESS CONTROL</p> Signup and view all the answers

    When using the mandatory access control model, what component is needed?

    <p>LABELS</p> Signup and view all the answers

    Which of the following statements regarding the MAC model is true?

    <p>MANDATORY ACCESS CONTROL USERS CANNOT SHARE RESOURCES DYNAMICALLY.</p> Signup and view all the answers

    In the DAC model, how are permissions identified?

    <p>ACCESS CONTROL LISTS</p> Signup and view all the answers

    Robert needs to access a resource. In the DAC model, what is used to identify him or other users?

    <p>ACLS</p> Signup and view all the answers

    A company has a high attrition rate. What should you ask the network administrator to do first?

    <p>REVIEW USER PERMISSIONS AND ACCESS CONTROL LISTS.</p> Signup and view all the answers

    Your company has 1000 users. Which of the following password management systems will work best for your company?

    <p>SELF-SERVICE PASSWORD RESETTING</p> Signup and view all the answers

    In a discretionary access control model, who is in charge of setting permissions to a resource?

    <p>THE OWNER OF THE RESOURCE</p> Signup and view all the answers

    Jason needs to add several users to a group. Which of the following will help him to get the job done faster?

    <p>TEMPLATE</p> Signup and view all the answers

    How are permissions defined in the mandatory access control model?

    <p>PREDEFINED ACCESS PRIVILEGES</p> Signup and view all the answers

    Which of the following would lower the level of password security?

    <p>COMPLEX PASSWORDS THAT USERS CANNOT CHANGE ARE RANDOMLY GENERATED BY THE ADMINISTRATOR.</p> Signup and view all the answers

    Of the following access control models, which uses object labels?

    <p>MANDATORY ACCESS CONTROL</p> Signup and view all the answers

    Which of the following methods could identify when an unauthorized access has occurred?

    <p>PREVIOUS LOGON NOTIFICATION</p> Signup and view all the answers

    What would you use to control the traffic that is allowed in or out of a network?

    <p>ACCESS CONTROL LISTS</p> Signup and view all the answers

    In an attempt to deter fraud and defend against it, your company cross trains people in each department. This is an example of?

    <p>JOB ROTATION</p> Signup and view all the answers

    What is a definition of implicit deny?

    <p>RESOURCES THAT ARE NOT GIVEN ACCESS ARE DENIED BY DEFAULT.</p> Signup and view all the answers

    In an environment where administrators, the accounting department, and the marketing department all have different levels of access, which of the following access control models is being used?

    <p>ROLE BASED ACCESS CONTROL (RBAC)</p> Signup and view all the answers

    Which security measure should be included when implementing access control?

    <p>PASSWORD COMPLEXITY REQUIREMENTS</p> Signup and view all the answers

    Which password management system best provides for a system with a large number of users?

    <p>SELF SERVICE PASSWORD RESET MANAGEMENT SYSTEM</p> Signup and view all the answers

    You administer a bulletin board system for a rock and roll band. While reviewing logs for the board, you see one particular IP address posting spam multiple times per day. What is the best way to prevent this type of problem?

    <p>IMPLEMENT CAPTCHA</p> Signup and view all the answers

    Your organization has enacted a policy where employees are required to create passwords with at least 15 characters. What type of policy does this define?

    <p>PASSWORD LENGTH</p> Signup and view all the answers

    Users are required to change their passwords every 30 days. Which policy should be configured?

    <p>PASSWORD EXPIRATION</p> Signup and view all the answers

    You want to mitigate the possibility of privilege creep among your long-term users. What procedure should you employ?

    <p>USER PERMISSION REVIEWS</p> Signup and view all the answers

    A security administrator implements access controls based on the security classification of the data and need-to-know information. Which of the following would best describe this level of access control?

    <p>MANDATORY ACCESS CONTROL</p> Signup and view all the answers

    Which of the following access control models would be found in a firewall?

    <p>RULE BASED ACCESS CONTROL</p> Signup and view all the answers

    You are consulting a small organization that relies on employees who work from home and on the road. A hack has compromised the network by denying remote access to the company using a script. Which of the following security controls did the hacker exploit?

    <p>ACCOUNT LOCKOUT</p> Signup and view all the answers

    Which type of vulnerability assessment software can check for weak passwords on the network?

    <p>PASSWORD CRACKER</p> Signup and view all the answers

    You are contracted to conduct a forensic analysis of the computer. What should you do first?

    <p>BACK UP SYSTEM</p> Signup and view all the answers

    Which of the following has schemas written in XML?

    <p>OVAL</p> Signup and view all the answers

    Russ is using only documentation to test the security of a system. What type of testing methodology is this known as?

    <p>PASSIVE SECURITY ANALYSIS</p> Signup and view all the answers

    Of the following, which is the best way for a person to find out what security holes exist on the network?

    <p>PERFORM A VULNERABILITY ASSESSMENT</p> Signup and view all the answers

    After using Nmap to do a port scan of your server, you find that several ports are open. Which of the following should you do next?

    <p>EXAMINE THE SERVICES AND/OR PROCESSES THAT USE THOSE PORTS</p> Signup and view all the answers

    Which of the following is a vulnerability assessment tool?

    <p>NESSUS</p> Signup and view all the answers

    You are a consultant for an IT company. Your boss asks you to determine the topology of the network. What is the best device to use in this circumstance?

    <p>NETWORK MAPPER</p> Signup and view all the answers

    Which of the following can enable you to find all the open ports on an entire network?

    <p>NETWORK SCANNER</p> Signup and view all the answers

    What can hackers accomplish using malicious port scanning?

    <p>FINGERPRINT OF THE OPERATING SYSTEM</p> Signup and view all the answers

    Many companies send passwords via clear text. Which of the following can view these passwords?

    <p>PROTOCOL ANALYZER</p> Signup and view all the answers

    Which of the following persons is ultimately in charge of deciding how much residual risk there will be?

    <p>SENIOR MANAGEMENT</p> Signup and view all the answers

    To show risk from a monetary standpoint, which of the following should risk assessments be based upon?

    <p>QUANTITATIVE MEASUREMENT OF RISK, IMPACT, AND ASSET VALUE</p> Signup and view all the answers

    Study Notes

    Password Security

    • The strongest password option is "This1sV#ryS3cure", which combines upper and lower case letters, numbers, and special characters.
    • A self-service password resetting system is beneficial for managing passwords for a large number of users.

    Windows Security Components

    • User Account Control (UAC) is a vital security feature in Windows that helps prevent unauthorized changes to the operating system.

    Authentication and Access Control

    • The key combination "CTRL+ALT+DEL" is crucial for securing the logon process on Windows machines.
    • The most common authentication model is using a username and password.
    • Rule-based access control uses established rules to determine object access permissions.

    Access Control Models

    • Mandatory Access Control (MAC) requires the use of labels to enforce access restrictions.
    • Discretionary Access Control (DAC) allows resource owners to set permissions for their resources using Access Control Lists (ACLs).
    • Role-Based Access Control (RBAC) assigns access rights based on user roles within the organization.

    Security Policies and Procedures

    • Implementing password complexity requirements enhances security.
    • Employees should create passwords of at least 15 characters to strengthen security posture.

    Job and Role Management

    • Job rotation and user permission reviews are strategies to mitigate privilege creep in users with long-term access.
    • A template can expedite the process of adding users to groups in an organization.

    Risk Management

    • Senior management ultimately decides the level of residual risk that an organization will accept.
    • Quantitative risk assessments are essential for determining monetary impacts related to risk management decisions.

    Vulnerability Assessments

    • A vulnerability assessment tool like Nessus can help identify security weaknesses in networks.
    • Port scanning can reveal open ports that may expose systems to attacks and should be followed up with an examination of the services running on those ports.

    Network Security

    • Access Control Lists (ACLs) are used to control network traffic flow and determine the permissions granted to resources.
    • Implementing CAPTCHA can help prevent automated spam attacks in online systems.

    General Security Practices

    • Session termination and previous logon notifications are methods to identify unauthorized access attempts.
    • Mandatory vacations are a practice that aids in the separation of duties, preventing potential fraud.

    Logging and Monitoring

    • Forensic analysis begins with backing up the system to prevent data loss before any analysis takes place.
    • Protocol analyzers can view passwords sent in clear text on unsecured networks.

    Miscellaneous Security Concepts

    • Implicit deny means that any resources not explicitly granted access are denied by default.
    • A network mapper is the best device for determining network topology in a consulting scenario.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on fundamental cybersecurity concepts including password security, Windows security components, and various access control models. This quiz covers essential practices such as User Account Control and authentication methods to safeguard systems.

    More Like This

    Use Quizgecko on...
    Browser
    Browser