Securing Windows 7 Workstation with Multiple User Accounts

question
One of the Windows 7 workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system. What should you to increqase the security of his system?
answer
Disable the Guest account
question
What Security Practice is an example of the Principle of Least Privilege?
answer
All users on a Windows workstation are limited users except for one user who is responsible for maintaining the system.
question
You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to displse of the discs. What method should you use to best prevent extracting data from the discs?
answer
Shredding
question
You nee to enable a screen saver password on the Windows 7 workstation in your organization. What CP option should you use to do this?
answer
Personalization
question
You are responsible for disposing of several old workstations formerly used by accountants in your organization's Finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. To do this, you use the Windows XP Installation CD that came with these systems to delete all partitions from the hard drives. Have you properly prepared these systems for disposal?
answer
No, you should use disk wiping software to fully erase the drives.
question
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned someone might walk by and take of of these laptops. Which of the following is the best protections to implement to address your concerns?
answer
Use cable locks to chain the laptops to the desks.
question
You have purchased new computers and will be disposing of our old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. What should you do prior to getting rid of the computers?
answer
Use data wiping software to clear the hard drives
question
What is the best countermeasure against social engineering?
answer
user awareness training
question
Several users have forwarded you an email stating that your company's health insurance provider has just launched a new web site for all employees to access the site they are told in the email to click a link and provide their personal information. Upon investigation, you discover that your company;s health insurance provider did not send this e-mail. What kind of attack just occurred?
answer
Phishing
question
Which of the following are common forms of social engineering attack?
answer
Hoax virus information emails
question
You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victims of a social engineering attack. What should you recommend they do to mitigate the risk?
answer
Teach users how to recognize and respond to social engineering attacks
question
What function is performed by the TMP?
answer
Create a hash of system components
question
You want to configure your computer so that a password is required before the operating system will load. What should you do?
answer
Configure a user password in the BIOS
question
Which of the following would indicate when a system case cover is removed?
answer
Chassis intrustion detection
question
Which security measure uses a unique key that can be used for hardware system identification?
answer
TPM- trusted platform module
question
While browsing the Internet, you notice that the browser displays pop-ups that are targeted towards recent keyword searches you have performed. What is this an example of?
answer
Adware
question
Which of the following could easily result in a mailbox being full so that messages can't be received?
answer
Spam
question
You have installed anti-malware software that checks for viruses in email attachments. Yu configure the software to quarantine any files with problems. You receive an email w/ an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. hat has happened to the file?
answer
It has been moved to a folder on our computer.
question
You have installed anti-malware software on a computer that only you use. You want to protect the computer from files that you download from the Internet. What should you do next to make sure that there arent any existing files on your system that are infected?
answer
Run a full scan
question
Which of the following is the process f fixing problems detected by anti-virus software so that the computer is restored to its original state?
answer
Remediation
question
What are the most common means of virus distribution? (2)
answer
Malicious web sites // email
question
To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would best prevent this scenario from occurring again?
answer
Configure the software to automatically download the virus definition files as soon as they become available.
question
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?
answer
Virus
question
A user reports that her machine is behaving erratically. She suspects something is wrong because lately a firewall alert keeps indicating programs are trying to access the Internet, and several files have disappeared or have been renamed. What do you suspect is causing these problems?
answer
Malware infection
question
Which of the following actions adds new features and fixes bugs for anti-malware software?
answer
Updating the anti-malware software
question
You have a computer that runs Windows 7. Where would you go to check if the system can recognize and use any installed anti-virus software?
answer
Security center
question
After installing some software a few days ago your DVD drive tray randomly began to open and close. Today, you were called into our boss's office to discuss why you are calling 900 numbers while at work. Which type f malware would create these symptoms?
answer
Grayware
question
You discover that a system on your network has been infected with a worm. What is the best way to prevent the spread of the worm to other systems while you work on removing the worm?
answer
Quarantine the computer
question
What is the program that appears to be a legit application utility, game, or screensaver and hat performs malicious activities surreptitiously?
answer
Trojan horse
question
Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?
answer
Spamming
question
You have just installed anti-virus software on all computers on your company networks. Which additional actions should you take yo help protect systems from malicious software? (2)
answer
Train users to scan removable storage devices before copying files. // Train users to update the virus definition files frequently
question
Your anti-virus software has detected malware on your system. However, the anti-virus software is unable to remove it, and when you try to delete the files, you can'y because they are in use. What should you try first?
answer
Boot into Safe Mode and try removing the malware
question
A user reports that his machine will no longer boot properly. After asking several questions to determine the problem you suspect the user unknowingly downloaded malware from the internet, and the malware corrupted the boot block. Based on your suspicions, what actions could you take to correct the problem? (2)
answer
Boot from the Windows 7 installation DVD and use the Recovery Environment to run a startup repair. // Reimage the machine
question
If your anti-virus software doesn't detect and remove a virus, what should you try first?
answer
Update your virus detection software
question
You manage 2 computers with the following user accounts: -Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does. -Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not. You are working from Wrk2 and would like to access a shared folder on Wrk1. What credentials should you use to access the shared folder?
answer
Type Admin for the username and specify the password
question
You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You want to force them to use a new password 5 days before changing it again. which policies should you configure? (2)
answer
Minimum password age// Enforce password History
question
What type of security measures is a form of biometrics?
answer
Fingerprint scanner
question
What is a hardware device that contains ID info and which can be used to control building access or computer logon?
answer
Smart card
question
Following Windows installation, you enabled the built-in Admin account . You remove the password for this account, You enable remote Desktop on your computer using the default settings.. From home, you try to access your computer using Remote Desktop using the Admin account but you are unable to log on. What should you do?
answer
Configure a password for the Admin account
question
What is the most common form of authentication?
answer
Username and password
question
A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. What's causing the problem?
answer
She has turned Num Lock on causing numbers to be sent from the keyboard instead of letters.
question
What are (2) biometric devices?
answer
Face scanner /// Retina scanner
question
While trying to log on, a user accidently typed the wrong password three times, and now the system tells him that he can't log on because of too many incorrect passwords. He still remembers his password, but just typed it wrong. He needs access as quickly as possible, what should you do?
answer
Unlock the account
question
Which type of biometric authentication uses the ridges of your skin?
answer
fingerprint
question
What do biometrics use to perform authentication of identity?
answer
human characteristics
question
You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which (2) policies should you configure?
answer
Minimum password length // Account lockout threshold
question
A VPN is used for what purpose?
answer
Support secured communications over an untrusted network
question
What security measures encrypts the entire contents of a hard drive?
answer
DriveLock
question
What wireless security methods use a common shared key configured on the wireless access point and all wireless clients?
answer
WEP, WPA Personal, WPA2 Personal
question
What provides security for wireless networks?
answer
WPA2
question
What security solutions would prevent a user from reading a file which she did not create?
answer
EFS
question
What security protocols establish a secure connection and encrypt data for a VPN? (3)
answer
IPSec, PPTP, L2TP
question
What form of networking is highly susceptible to eaves dropping (data interception) and must be secured accordingly?
answer
Wireless
question
You want a security solution that protects the entire hard drive, preventing access even when it is moved to anther system. which solution would you choose?
answer
BitLocker
question
What TCP/IP protocol is a secure form of HTTP that uses SSL as a sublayer for security?
answer
HTTPS
question
Which of the following is the best device to deploy to protect your private network from a public untrusted network?
answer
Firewall
question
What is a firewall function?
answer
packet filtering
question
What 2 actions taken directly improves system security on Windows systems?
answer
Install anti-virus software. // Enable the Windows firewall
question
You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. What should you do?
answer
Open the firewall port for the Remote Desktop program
question
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?
answer
Web server, e-mail server
question
A good reason to install a firewall?
answer
You want to restrict Internet users from accessing private data on your network
question
You are configuring a network firewall to allow SMTP outbound e-mail traffic, and POP3 inbound e-mail traffic. What (2) IP ports should you open in the firewall?
answer
25 for SMTP// 110 for POP3
question
To access your company's internet network from home, you use Secure SHell (SSH). The admin has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home?
answer
22
question
To increase security on your company's internal network, the admin has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit car transactions. Which port needs to be enabled to allow secure transactions?
answer
443
question
What are (2) functions performed by proxy servers?
answer
block employees from accessing certain web sites // cache web pages
question
You would like to control Internet access based on users, time of day, and Web sites visited. How can you do this?
answer
Install a proxy server. Allow Internet access only through the proxy server.
question
You connect your computer to a wireless network available at the local library. You find that you can access all websites you want on the Internet except for two. What might be causing the problem?
answer
A proxy server is blocking access to the web sites.
question
Two employees cannot access any sites outside of the local network, but can still access internal files on other internal subnets. Other employees are not experiencing the same problem. You suspect the issues may have something to do with the proxy server on your network and the settings in Internet Explorer. What should you do?
answer
Identify the proxy server nae and port number in Internet Options.
1 of

Unlock all answers in this set

Unlock answers
question
One of the Windows 7 workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system. What should you to increqase the security of his system?
answer
Disable the Guest account
question
What Security Practice is an example of the Principle of Least Privilege?
answer
All users on a Windows workstation are limited users except for one user who is responsible for maintaining the system.
question
You have a set of DVD-RW discs that have been used to archive files for your latest development project. You need to displse of the discs. What method should you use to best prevent extracting data from the discs?
answer
Shredding
question
You nee to enable a screen saver password on the Windows 7 workstation in your organization. What CP option should you use to do this?
answer
Personalization
question
You are responsible for disposing of several old workstations formerly used by accountants in your organization's Finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. To do this, you use the Windows XP Installation CD that came with these systems to delete all partitions from the hard drives. Have you properly prepared these systems for disposal?
answer
No, you should use disk wiping software to fully erase the drives.
question
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned someone might walk by and take of of these laptops. Which of the following is the best protections to implement to address your concerns?
answer
Use cable locks to chain the laptops to the desks.
question
You have purchased new computers and will be disposing of our old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. What should you do prior to getting rid of the computers?
answer
Use data wiping software to clear the hard drives
question
What is the best countermeasure against social engineering?
answer
user awareness training
question
Several users have forwarded you an email stating that your company's health insurance provider has just launched a new web site for all employees to access the site they are told in the email to click a link and provide their personal information. Upon investigation, you discover that your company;s health insurance provider did not send this e-mail. What kind of attack just occurred?
answer
Phishing
question
Which of the following are common forms of social engineering attack?
answer
Hoax virus information emails
question
You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victims of a social engineering attack. What should you recommend they do to mitigate the risk?
answer
Teach users how to recognize and respond to social engineering attacks
question
What function is performed by the TMP?
answer
Create a hash of system components
question
You want to configure your computer so that a password is required before the operating system will load. What should you do?
answer
Configure a user password in the BIOS
question
Which of the following would indicate when a system case cover is removed?
answer
Chassis intrustion detection
question
Which security measure uses a unique key that can be used for hardware system identification?
answer
TPM- trusted platform module
question
While browsing the Internet, you notice that the browser displays pop-ups that are targeted towards recent keyword searches you have performed. What is this an example of?
answer
Adware
question
Which of the following could easily result in a mailbox being full so that messages can't be received?
answer
Spam
question
You have installed anti-malware software that checks for viruses in email attachments. Yu configure the software to quarantine any files with problems. You receive an email w/ an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. hat has happened to the file?
answer
It has been moved to a folder on our computer.
question
You have installed anti-malware software on a computer that only you use. You want to protect the computer from files that you download from the Internet. What should you do next to make sure that there arent any existing files on your system that are infected?
answer
Run a full scan
question
Which of the following is the process f fixing problems detected by anti-virus software so that the computer is restored to its original state?
answer
Remediation
question
What are the most common means of virus distribution? (2)
answer
Malicious web sites // email
question
To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would best prevent this scenario from occurring again?
answer
Configure the software to automatically download the virus definition files as soon as they become available.
question
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?
answer
Virus
question
A user reports that her machine is behaving erratically. She suspects something is wrong because lately a firewall alert keeps indicating programs are trying to access the Internet, and several files have disappeared or have been renamed. What do you suspect is causing these problems?
answer
Malware infection
question
Which of the following actions adds new features and fixes bugs for anti-malware software?
answer
Updating the anti-malware software
question
You have a computer that runs Windows 7. Where would you go to check if the system can recognize and use any installed anti-virus software?
answer
Security center
question
After installing some software a few days ago your DVD drive tray randomly began to open and close. Today, you were called into our boss's office to discuss why you are calling 900 numbers while at work. Which type f malware would create these symptoms?
answer
Grayware
question
You discover that a system on your network has been infected with a worm. What is the best way to prevent the spread of the worm to other systems while you work on removing the worm?
answer
Quarantine the computer
question
What is the program that appears to be a legit application utility, game, or screensaver and hat performs malicious activities surreptitiously?
answer
Trojan horse
question
Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?
answer
Spamming
question
You have just installed anti-virus software on all computers on your company networks. Which additional actions should you take yo help protect systems from malicious software? (2)
answer
Train users to scan removable storage devices before copying files. // Train users to update the virus definition files frequently
question
Your anti-virus software has detected malware on your system. However, the anti-virus software is unable to remove it, and when you try to delete the files, you can'y because they are in use. What should you try first?
answer
Boot into Safe Mode and try removing the malware
question
A user reports that his machine will no longer boot properly. After asking several questions to determine the problem you suspect the user unknowingly downloaded malware from the internet, and the malware corrupted the boot block. Based on your suspicions, what actions could you take to correct the problem? (2)
answer
Boot from the Windows 7 installation DVD and use the Recovery Environment to run a startup repair. // Reimage the machine
question
If your anti-virus software doesn't detect and remove a virus, what should you try first?
answer
Update your virus detection software
question
You manage 2 computers with the following user accounts: -Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set; the Admin account does. -Wrk2 has user accounts Mary and Julia. The Mary account has a password set; the Julia account does not. You are working from Wrk2 and would like to access a shared folder on Wrk1. What credentials should you use to access the shared folder?
answer
Type Admin for the username and specify the password
question
You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You want to force them to use a new password 5 days before changing it again. which policies should you configure? (2)
answer
Minimum password age// Enforce password History
question
What type of security measures is a form of biometrics?
answer
Fingerprint scanner
question
What is a hardware device that contains ID info and which can be used to control building access or computer logon?
answer
Smart card
question
Following Windows installation, you enabled the built-in Admin account . You remove the password for this account, You enable remote Desktop on your computer using the default settings.. From home, you try to access your computer using Remote Desktop using the Admin account but you are unable to log on. What should you do?
answer
Configure a password for the Admin account
question
What is the most common form of authentication?
answer
Username and password
question
A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. What's causing the problem?
answer
She has turned Num Lock on causing numbers to be sent from the keyboard instead of letters.
question
What are (2) biometric devices?
answer
Face scanner /// Retina scanner
question
While trying to log on, a user accidently typed the wrong password three times, and now the system tells him that he can't log on because of too many incorrect passwords. He still remembers his password, but just typed it wrong. He needs access as quickly as possible, what should you do?
answer
Unlock the account
question
Which type of biometric authentication uses the ridges of your skin?
answer
fingerprint
question
What do biometrics use to perform authentication of identity?
answer
human characteristics
question
You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which (2) policies should you configure?
answer
Minimum password length // Account lockout threshold
question
A VPN is used for what purpose?
answer
Support secured communications over an untrusted network
question
What security measures encrypts the entire contents of a hard drive?
answer
DriveLock
question
What wireless security methods use a common shared key configured on the wireless access point and all wireless clients?
answer
WEP, WPA Personal, WPA2 Personal
question
What provides security for wireless networks?
answer
WPA2
question
What security solutions would prevent a user from reading a file which she did not create?
answer
EFS
question
What security protocols establish a secure connection and encrypt data for a VPN? (3)
answer
IPSec, PPTP, L2TP
question
What form of networking is highly susceptible to eaves dropping (data interception) and must be secured accordingly?
answer
Wireless
question
You want a security solution that protects the entire hard drive, preventing access even when it is moved to anther system. which solution would you choose?
answer
BitLocker
question
What TCP/IP protocol is a secure form of HTTP that uses SSL as a sublayer for security?
answer
HTTPS
question
Which of the following is the best device to deploy to protect your private network from a public untrusted network?
answer
Firewall
question
What is a firewall function?
answer
packet filtering
question
What 2 actions taken directly improves system security on Windows systems?
answer
Install anti-virus software. // Enable the Windows firewall
question
You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. What should you do?
answer
Open the firewall port for the Remote Desktop program
question
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?
answer
Web server, e-mail server
question
A good reason to install a firewall?
answer
You want to restrict Internet users from accessing private data on your network
question
You are configuring a network firewall to allow SMTP outbound e-mail traffic, and POP3 inbound e-mail traffic. What (2) IP ports should you open in the firewall?
answer
25 for SMTP// 110 for POP3
question
To access your company's internet network from home, you use Secure SHell (SSH). The admin has recently implemented a firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home?
answer
22
question
To increase security on your company's internal network, the admin has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit car transactions. Which port needs to be enabled to allow secure transactions?
answer
443
question
What are (2) functions performed by proxy servers?
answer
block employees from accessing certain web sites // cache web pages
question
You would like to control Internet access based on users, time of day, and Web sites visited. How can you do this?
answer
Install a proxy server. Allow Internet access only through the proxy server.
question
You connect your computer to a wireless network available at the local library. You find that you can access all websites you want on the Internet except for two. What might be causing the problem?
answer
A proxy server is blocking access to the web sites.
question
Two employees cannot access any sites outside of the local network, but can still access internal files on other internal subnets. Other employees are not experiencing the same problem. You suspect the issues may have something to do with the proxy server on your network and the settings in Internet Explorer. What should you do?
answer
Identify the proxy server nae and port number in Internet Options.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New