Podcast
Questions and Answers
What is the primary benefit of using Full Disk Encryption (FDE)?
What is the primary benefit of using Full Disk Encryption (FDE)?
- It automatically backs up your data to a remote server.
- It speeds up data access times.
- It allows multiple users to access the same files simultaneously.
- It prevents unauthorized viewing of data on a storage drive. (correct)
If the decryption key to encrypted data is lost, what is the most likely outcome?
If the decryption key to encrypted data is lost, what is the most likely outcome?
- The data automatically reverts to its original, unencrypted state.
- A new key can be generated from the encrypted data itself.
- The data can be recovered using a universal decryption tool.
- Access to the encrypted data is permanently lost. (correct)
What is 'entropy' in the context of password security?
What is 'entropy' in the context of password security?
- The length of the password.
- The frequency with which a password is changed.
- The predictability of a password.
- The measurement of how unpredictable a password is. (correct)
Why is it important to change the default username and password on a new router or switch?
Why is it important to change the default username and password on a new router or switch?
Why might an organization choose to disable network access for certain users between midnight and 4:00 AM?
Why might an organization choose to disable network access for certain users between midnight and 4:00 AM?
What is the purpose of disabling unnecessary or default accounts on an operating system?
What is the purpose of disabling unnecessary or default accounts on an operating system?
What security measure does the 'Interactive logon: Machine account lockout threshold' policy in Windows address?
What security measure does the 'Interactive logon: Machine account lockout threshold' policy in Windows address?
What is the primary security risk associated with the AutoRun feature (present in older Windows versions)?
What is the primary security risk associated with the AutoRun feature (present in older Windows versions)?
How does marking an account as 'never needing interactive login' improve security?
How does marking an account as 'never needing interactive login' improve security?
What is the main purpose of a privacy filter on a computer screen?
What is the main purpose of a privacy filter on a computer screen?
Why is it important to implement a password policy that includes password expiration?
Why is it important to implement a password policy that includes password expiration?
What is the significance of storing encryption keys in an Active Directory database?
What is the significance of storing encryption keys in an Active Directory database?
How does enabling the screen lock feature on an operating system enhance security?
How does enabling the screen lock feature on an operating system enhance security?
What is Personally Identifiable Information (PII)?
What is Personally Identifiable Information (PII)?
Instead of assigning administrator access to everyone in the organization, what is a more secure practice?
Instead of assigning administrator access to everyone in the organization, what is a more secure practice?
What is the purpose of the 'Interactive logon: Machine inactivity limit' security policy in Windows?
What is the purpose of the 'Interactive logon: Machine inactivity limit' security policy in Windows?
Why was the AutoRun feature removed from later versions of Windows?
Why was the AutoRun feature removed from later versions of Windows?
In Windows, what options does the AutoPlay feature offer when a removable drive is connected?
In Windows, what options does the AutoPlay feature offer when a removable drive is connected?
Other than password complexity, what is another factor that contributes to strong password entropy.
Other than password complexity, what is another factor that contributes to strong password entropy.
What action should an administrator take to limit the risk associated with service accounts on a system?
What action should an administrator take to limit the risk associated with service accounts on a system?
What is a primary reason for using a locking cable in conjunction with a laptop or tablet?
What is a primary reason for using a locking cable in conjunction with a laptop or tablet?
Which of the following actions is not a best practice for securing a system's BIOS?
Which of the following actions is not a best practice for securing a system's BIOS?
From a security perspective, what should an organization do about commonly known default usernames and passwords for operating systems and applications?
From a security perspective, what should an organization do about commonly known default usernames and passwords for operating systems and applications?
What is the primary security consideration when working with Personally Identifiable Information (PII) in a public area?
What is the primary security consideration when working with Personally Identifiable Information (PII) in a public area?
What is the best way to handle password resets to ensure the security of an account?
What is the best way to handle password resets to ensure the security of an account?
For critical systems, how often should passwords be changed compared to less sensitive systems?
For critical systems, how often should passwords be changed compared to less sensitive systems?
What should an administrator do with accounts that are created by default during operating system installation?
What should an administrator do with accounts that are created by default during operating system installation?
What is the benefit of restricting the hours during which specific users can log into a network?
What is the benefit of restricting the hours during which specific users can log into a network?
Flashcards
Full Disk Encryption (FDE)
Full Disk Encryption (FDE)
Encrypting all data on a drive.
Password Entropy
Password Entropy
A measure of how unpredictable a password is; aims for strong, unguessable passwords.
Default Credentials
Default Credentials
A username and password preset by the manufacturer on a new device.
UEFI/BIOS Administrator Password
UEFI/BIOS Administrator Password
A password required to make changes to the BIOS configuration.
Signup and view all the flashcards
UEFI/BIOS User Password
UEFI/BIOS User Password
A password that stops the boot process until correctly entered.
Signup and view all the flashcards
Automatic Screen Lock
Automatic Screen Lock
Automatically locking the computer screen when a user is away.
Signup and view all the flashcards
Personally Identifiable Information (PII)
Personally Identifiable Information (PII)
Data that can identify an individual, like name, address, or Social Security number.
Signup and view all the flashcards
Principle of Least Privilege
Principle of Least Privilege
Granting specific access rights and permissions based on job function.
Signup and view all the flashcards
Disable Unnecessary Accounts
Disable Unnecessary Accounts
Disabling accounts that don't require interactive logins.
Signup and view all the flashcards
Disable Interactive Login
Disable Interactive Login
Marking accounts as not needing interactive login.
Signup and view all the flashcards
Account Lockout Threshold
Account Lockout Threshold
Limiting the number of incorrect password attempts before an account is locked.
Signup and view all the flashcards
Inactivity Lock
Inactivity Lock
Automatically locking the system after a period of inactivity.
Signup and view all the flashcards
AutoRun (deprecated)
AutoRun (deprecated)
A feature that automatically executes a file on removable media. (disabled in Windows 7 and later).
Signup and view all the flashcards
AutoPlay
AutoPlay
A Windows feature that allows users to choose what happens when removable media is inserted.
Signup and view all the flashcardsStudy Notes
- To prevent unauthorized data viewing, data encryption can be used
- Full Disk Encryption (FDE) encrypts everything on a drive
- FDE is also known as encrypting data at rest
- Individual files/folders can be encrypted instead of the whole drive
- NTFS on Windows allows choosing specific items for encryption
- Encrypting USB drives is useful due to their small size and ease of loss
- Managing decryption keys is vital along with encrypting data
- Losing the decryption key results in permanent data access loss
- Active Directory environments can store keys for Microsoft NTFS and BitLocker
- Storing keys in Active Directory allows restoration from backup if the system has an issue
- Use strong passwords that are difficult to guess or brute force
- Password complexity is also known as entropy, which measures unpredictability
- Avoid single words or obvious passwords
- Mix uppercase, lowercase, and special characters
- A strong password is considered 8 characters or longer
- Use a phrase or series of words
- Passwords expire after a set time, usually 30-90 days
- Systems remember previous passwords to prevent reuse
- Critical systems may require more frequent password changes
- Password reset processes need clear verification steps
- Default usernames and passwords exist for switches, routers, and other devices
- Change default passwords during setup for security
- Attackers often try default credentials first
- UEFI BIOS has administrator and user passwords
- Administrator passwords are required to make changes to the BIOS
- User passwords stop the boot process until entered
- Require passwords, never allow blank passwords, and disable auto-login
- Operating systems should automatically lock the screen when a user is away
- Windows 10 and 11 have lock screen settings under personalization
- Configure screen lock for automatic activation after inactivity
- Use locking hardware for laptops, tablets, etc., to secure them to a fixed point
- Sensitive information is categorized as Personally Identifiable Information (PII)
- PII includes names, addresses, phone numbers, Social Security numbers, etc.
- Be aware of surroundings when working with PII in public
- Use a privacy filter in public areas to prevent screen viewing
User Rights
- Once authenticated, users get rights and permissions to access resources
- Assign specific rights and permissions based on job function, not administrator access
- Assign users to groups with associated permissions
- Limit network access during specific hours (e.g., midnight to 4:00 AM)
- Disable accounts not needing interactive login
- Disable unnecessary or guest accounts
Account Restrictions
- Some accounts are created by default or with application installations
- Mark service accounts as never needing interactive login to prevent login at a username prompt
- Ensure operating systems do not have default settings in authentication options
- Limit password attempts to prevent brute force attacks
- The security policy in Windows is called Interactive logon: Machine account lockout threshold
- Use automatic screen locking after inactivity
- There is a security policy for this called Interactive logon: Machine inactivity limit
- AutoRun (Windows Vista and earlier) automatically ran files from removable media
- AutoRun was removed in Windows 7 and later due to security concerns
- AutoPlay in Windows allows choosing actions for removable drive insertion
- AutoPlay options include configuring storage settings, taking no action, opening File Explorer, or asking each time
- Disable AutoPlay and AutoRun to prevent accidental execution of unexpected files from removable drives
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.