Port Security Rule Actions
32 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a factor contributing to the vulnerability of password-based authentication systems?

  • Multifactor sign-in (correct)
  • Poor user password practice
  • Compromised account credentials
  • Inadequate technologies
  • What is the recommended character length for an ordinary user account password?

  • Exactly 12 characters
  • Less than 12 characters
  • Between 12 and 15 characters
  • More than 15 characters (correct)
  • What should users avoid using in their passwords, according to the text?

  • Personal information (correct)
  • Dictionary files
  • Memorable phrases
  • Breached password databases
  • Which of the following is responsible for configuring file permissions in an OS's access control system?

    <p>File server administrator</p> Signup and view all the answers

    What is the principle that should guide the assignment of rights and privileges to employees?

    <p>Least privilege</p> Signup and view all the answers

    What should be done with the default administrator account in an OS?

    <p>It should be disabled</p> Signup and view all the answers

    What is the purpose of disabling the guest account on a computer?

    <p>To comply with security policies</p> Signup and view all the answers

    Which of the following is an example of personally identifiable information (PII)?

    <p>Username</p> Signup and view all the answers

    Which of the following is NOT a recommended end user best practice for password security?

    <p>Entering passwords into plain text files</p> Signup and view all the answers

    What is the purpose of a system/supervisor password?

    <p>To protect access to the firmware system-setup program</p> Signup and view all the answers

    What are some complexity requirements that password policies might impose?

    <p>All of the above</p> Signup and view all the answers

    Which of the following scenarios could result in data loss if strong authentication is not in place?

    <p>All of the above</p> Signup and view all the answers

    What is the role of the user's password in file encryption and decryption?

    <p>It protects the encryption key</p> Signup and view all the answers

    How can data be decrypted if the user's key is lost or damaged?

    <p>By using recovery agents</p> Signup and view all the answers

    Which of the following is NOT a type of threat that antivirus software can detect?

    <p>Viruses</p> Signup and view all the answers

    Which component of Windows manages Windows Defender Antivirus?

    <p>Windows Security Center</p> Signup and view all the answers

    What are the two types of updates generally necessary for antivirus software?

    <p>Definition updates and component updates</p> Signup and view all the answers

    How can Windows Defender Antivirus be temporarily disabled?

    <p>Toggling the Real-time protection button</p> Signup and view all the answers

    Which tool can be used to configure password and account policies on a standalone workstation?

    <p>Local Security Policy snap-in</p> Signup and view all the answers

    Where can settings be defined as group policy objects (GPO) and applied to groups of user and computer accounts within domains and organizational units (OUs)?

    <p>Group Policy Editor snap-in</p> Signup and view all the answers

    What does the 'Failed attempts lockout' policy help mitigate?

    <p>Password cracking attacks</p> Signup and view all the answers

    What does the 'Use timeout/screen lock' policy do?

    <p>Automatically logs out users after a certain period of inactivity</p> Signup and view all the answers

    Which operating system uses the system of Administrator and Standard user accounts, along with User Account Control (UAC) and system policies, to enforce restrictions?

    <p>Windows</p> Signup and view all the answers

    What is the purpose of using digital certificates in Windows applications?

    <p>To perform code signing</p> Signup and view all the answers

    Which type of software distribution model is used by mobile operating systems like Apple's iOS and Windows Mobile?

    <p>Walled garden model</p> Signup and view all the answers

    What is the primary means of detecting malware in antivirus software?

    <p>Using a database of known virus patterns</p> Signup and view all the answers

    Which of the following is NOT a type of trigger for configuring rules in the Advanced Firewall?

    <p>MAC address</p> Signup and view all the answers

    Which of the following best describes the default policy for the Advanced Firewall?

    <p>Allow all traffic</p> Signup and view all the answers

    Which edition of Windows does NOT support the Encrypting File System (EFS) feature?

    <p>Home edition</p> Signup and view all the answers

    What does data-at-rest refer to?

    <p>Data stored on a disk</p> Signup and view all the answers

    What can be used as a secure means of storing the encryption key for BitLocker?

    <p>All of the above</p> Signup and view all the answers

    What does BitLocker To Go refer to?

    <p>A form of BitLocker that can only be used with removable drives</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser