2.6 – Security Best Practices - Security Best Practices

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary benefit of using Full Disk Encryption (FDE)?

  • It automatically backs up your data to a remote server.
  • It speeds up data access times.
  • It allows multiple users to access the same files simultaneously.
  • It prevents unauthorized viewing of data on a storage drive. (correct)

If the decryption key to encrypted data is lost, what is the most likely outcome?

  • The data automatically reverts to its original, unencrypted state.
  • A new key can be generated from the encrypted data itself.
  • The data can be recovered using a universal decryption tool.
  • Access to the encrypted data is permanently lost. (correct)

What is 'entropy' in the context of password security?

  • The length of the password.
  • The frequency with which a password is changed.
  • The predictability of a password.
  • The measurement of how unpredictable a password is. (correct)

Why is it important to change the default username and password on a new router or switch?

<p>Default credentials are widely known and easily exploited by attackers. (D)</p> Signup and view all the answers

Why might an organization choose to disable network access for certain users between midnight and 4:00 AM?

<p>To prevent unauthorized access during times when legitimate users are unlikely to be working. (D)</p> Signup and view all the answers

What is the purpose of disabling unnecessary or default accounts on an operating system?

<p>To minimize potential attack vectors by removing accounts that could be exploited. (D)</p> Signup and view all the answers

What security measure does the 'Interactive logon: Machine account lockout threshold' policy in Windows address?

<p>It specifies the number of failed login attempts allowed before an account is locked. (B)</p> Signup and view all the answers

What is the primary security risk associated with the AutoRun feature (present in older Windows versions)?

<p>It could expose the system to malware by automatically running files from removable media. (C)</p> Signup and view all the answers

How does marking an account as 'never needing interactive login' improve security?

<p>It stops anyone from logging in via a username prompt, reducing the attack surface. (B)</p> Signup and view all the answers

What is the main purpose of a privacy filter on a computer screen?

<p>To prevent unauthorized viewing of sensitive information by people nearby. (C)</p> Signup and view all the answers

Why is it important to implement a password policy that includes password expiration?

<p>To mitigate the risk of compromised passwords being used indefinitely. (D)</p> Signup and view all the answers

What is the significance of storing encryption keys in an Active Directory database?

<p>It centralizes key management and provides a backup in case of system failure. (B)</p> Signup and view all the answers

How does enabling the screen lock feature on an operating system enhance security?

<p>It prevents unauthorized physical access to the computer when the user is away. (C)</p> Signup and view all the answers

What is Personally Identifiable Information (PII)?

<p>Information that can be used to identify an individual. (C)</p> Signup and view all the answers

Instead of assigning administrator access to everyone in the organization, what is a more secure practice?

<p>Assigning rights and permissions based on job function. (C)</p> Signup and view all the answers

What is the purpose of the 'Interactive logon: Machine inactivity limit' security policy in Windows?

<p>To automatically lock the computer screen after a period of user inactivity. (D)</p> Signup and view all the answers

Why was the AutoRun feature removed from later versions of Windows?

<p>It was a significant security concern due to the risk of automatically running malicious files. (B)</p> Signup and view all the answers

In Windows, what options does the AutoPlay feature offer when a removable drive is connected?

<p>Open File Explorer, take no action, configure storage settings, or ask each time. (C)</p> Signup and view all the answers

Other than password complexity, what is another factor that contributes to strong password entropy.

<p>Using a variety of character types, including uppercase, lowercase, numbers, and symbols. (A)</p> Signup and view all the answers

What action should an administrator take to limit the risk associated with service accounts on a system?

<p>Mark service accounts as 'never needing interactive login'. (B)</p> Signup and view all the answers

What is a primary reason for using a locking cable in conjunction with a laptop or tablet?

<p>To prevent theft of the device. (D)</p> Signup and view all the answers

Which of the following actions is not a best practice for securing a system's BIOS?

<p>Allowing a blank password on the system for ease of use. (A)</p> Signup and view all the answers

From a security perspective, what should an organization do about commonly known default usernames and passwords for operating systems and applications?

<p>Change all default usernames and passwords immediately after installation. (D)</p> Signup and view all the answers

What is the primary security consideration when working with Personally Identifiable Information (PII) in a public area?

<p>Preventing unauthorized individuals from viewing the PII on your screen. (B)</p> Signup and view all the answers

What is the best way to handle password resets to ensure the security of an account?

<p>Provide a clear password reset process with multiple verifications. (C)</p> Signup and view all the answers

For critical systems, how often should passwords be changed compared to less sensitive systems?

<p>More often, to reduce the window of opportunity for exploitation. (A)</p> Signup and view all the answers

What should an administrator do with accounts that are created by default during operating system installation?

<p>Review and disable the unnecessary ones. (A)</p> Signup and view all the answers

What is the benefit of restricting the hours during which specific users can log into a network?

<p>It prevents access from third parties during off-hours. (D)</p> Signup and view all the answers

Flashcards

Full Disk Encryption (FDE)

Encrypting all data on a drive.

Password Entropy

A measure of how unpredictable a password is; aims for strong, unguessable passwords.

Default Credentials

A username and password preset by the manufacturer on a new device.

UEFI/BIOS Administrator Password

A password required to make changes to the BIOS configuration.

Signup and view all the flashcards

UEFI/BIOS User Password

A password that stops the boot process until correctly entered.

Signup and view all the flashcards

Automatic Screen Lock

Automatically locking the computer screen when a user is away.

Signup and view all the flashcards

Personally Identifiable Information (PII)

Data that can identify an individual, like name, address, or Social Security number.

Signup and view all the flashcards

Principle of Least Privilege

Granting specific access rights and permissions based on job function.

Signup and view all the flashcards

Disable Unnecessary Accounts

Disabling accounts that don't require interactive logins.

Signup and view all the flashcards

Disable Interactive Login

Marking accounts as not needing interactive login.

Signup and view all the flashcards

Account Lockout Threshold

Limiting the number of incorrect password attempts before an account is locked.

Signup and view all the flashcards

Inactivity Lock

Automatically locking the system after a period of inactivity.

Signup and view all the flashcards

AutoRun (deprecated)

A feature that automatically executes a file on removable media. (disabled in Windows 7 and later).

Signup and view all the flashcards

AutoPlay

A Windows feature that allows users to choose what happens when removable media is inserted.

Signup and view all the flashcards

Study Notes

  • To prevent unauthorized data viewing, data encryption can be used
  • Full Disk Encryption (FDE) encrypts everything on a drive
  • FDE is also known as encrypting data at rest
  • Individual files/folders can be encrypted instead of the whole drive
  • NTFS on Windows allows choosing specific items for encryption
  • Encrypting USB drives is useful due to their small size and ease of loss
  • Managing decryption keys is vital along with encrypting data
  • Losing the decryption key results in permanent data access loss
  • Active Directory environments can store keys for Microsoft NTFS and BitLocker
  • Storing keys in Active Directory allows restoration from backup if the system has an issue
  • Use strong passwords that are difficult to guess or brute force
  • Password complexity is also known as entropy, which measures unpredictability
  • Avoid single words or obvious passwords
  • Mix uppercase, lowercase, and special characters
  • A strong password is considered 8 characters or longer
  • Use a phrase or series of words
  • Passwords expire after a set time, usually 30-90 days
  • Systems remember previous passwords to prevent reuse
  • Critical systems may require more frequent password changes
  • Password reset processes need clear verification steps
  • Default usernames and passwords exist for switches, routers, and other devices
  • Change default passwords during setup for security
  • Attackers often try default credentials first
  • UEFI BIOS has administrator and user passwords
  • Administrator passwords are required to make changes to the BIOS
  • User passwords stop the boot process until entered
  • Require passwords, never allow blank passwords, and disable auto-login
  • Operating systems should automatically lock the screen when a user is away
  • Windows 10 and 11 have lock screen settings under personalization
  • Configure screen lock for automatic activation after inactivity
  • Use locking hardware for laptops, tablets, etc., to secure them to a fixed point
  • Sensitive information is categorized as Personally Identifiable Information (PII)
  • PII includes names, addresses, phone numbers, Social Security numbers, etc.
  • Be aware of surroundings when working with PII in public
  • Use a privacy filter in public areas to prevent screen viewing

User Rights

  • Once authenticated, users get rights and permissions to access resources
  • Assign specific rights and permissions based on job function, not administrator access
  • Assign users to groups with associated permissions
  • Limit network access during specific hours (e.g., midnight to 4:00 AM)
  • Disable accounts not needing interactive login
  • Disable unnecessary or guest accounts

Account Restrictions

  • Some accounts are created by default or with application installations
  • Mark service accounts as never needing interactive login to prevent login at a username prompt
  • Ensure operating systems do not have default settings in authentication options
  • Limit password attempts to prevent brute force attacks
  • The security policy in Windows is called Interactive logon: Machine account lockout threshold
  • Use automatic screen locking after inactivity
  • There is a security policy for this called Interactive logon: Machine inactivity limit
  • AutoRun (Windows Vista and earlier) automatically ran files from removable media
  • AutoRun was removed in Windows 7 and later due to security concerns
  • AutoPlay in Windows allows choosing actions for removable drive insertion
  • AutoPlay options include configuring storage settings, taking no action, opening File Explorer, or asking each time
  • Disable AutoPlay and AutoRun to prevent accidental execution of unexpected files from removable drives

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Mastering Data Recovery
3 questions
Full Disk Encryption and Data Protection
23 questions
Full Disk Encryption Overview
18 questions

Full Disk Encryption Overview

RevolutionaryDulcimer avatar
RevolutionaryDulcimer
Data Encryption Standard (DES) Overview
77 questions
Use Quizgecko on...
Browser
Browser