• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/144

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

144 Cards in this Set

  • Front
  • Back

What do you edit if you want users to be logged off automatically when the smart card is removed?

Edit settings in the local security policy.

Smart card policies apply to _____,not ______.

to the computer and not the user

does the smart card certificate remain in credential manager?

NO , remains on the smart card

You need to execute the program without receiving a prompt for elevated privileges.

Use runas.exe

You want to implement a form of authentication which takes advantage of PIV what should you use?

Use smart card authentication

What does (PIV) stand for?

Personal Identity Verification

a password, a biometric scan, and a token device used together. Is an example of ?

multi-factor authentication.

A Multi-factor authentication is?

multi-factor authentication is any combination of two or more of the same or different authentification factors. (password)(device, token, smartcard),(biometric)




*Something,You know,have,Are

You need to delete the stored password. where do you go?

Credential Manager, remove the credential from the Vault.

What two setting. To prevent users from reusing old passwords. You want them use password for at least 5 days before changing it again.

-set the enforce password history




-set the minimum password age policy.

With the least amount of effort possible, you need to ensure that every time you connect to a shared folder on Server1, you authenticate by using an account named Admin not the user currently logged in as.




What should you do?

From Credential Manager, select Add a Windows credential.

What two setting to create passwords that are at least 10 characters long. Prevent logon after three unsuccessful logon attempts.

-set the minimum password length policy.




-set the account lockout threshold policy.

What is the default authentication method for Windows 7 ?

Kerberos v5

Kerberos grants______(also called a _____ ______)

Kerberos grants tickets (also called a security token)

whats delegated authentication?

The process of using tickets to validate permissions

(AS) Authentication Server

accepts and processes authentication requests.

(SS) Service Server

Is a server that provides or holds network resources.

(TGS) Ticket Granting Server

Grants tickets that are valid for specific resources on specific servers.

(NTLM) stand for

Windows NT LAN Manager

Windows 7 supports NTLM, but it is only used for ?

Windows 7 supports NTLM, but it is only used for backwards compatibility with computers that do not support Kerberos (such as Windows NT 4.0 servers)

a certificate is

digital document that identifies a user or a computer

The certificate includes a _______ _______ that is?

subject name that is the name of a user or a computer.

What does (PKI) stand for, and what does it do?

Public Key Infrastructure, is a system that provides for a trusted third party to vouch for user identities.

A PKI is made up of (___)

PKI is made up of (CAs),Certification Authorities.

A (CA) is?

CA is an entity trusted to issue, store, and revoke certificates.

Smart card is?

is a physical card that contains a memory chip.


Authentication credentials are embedded in this memory chip.

where do you go to edit the smart card settings?

Group Policy or Local Security Policy

(PIV) allows the use of ?

smart cards without requiring specific vendor By supporting PIV, Windows 7 obtains drivers for smart cards from Windows Update or built-in PIV-compliant mini drivers.

Biometric is a ?

Human trait or characteristic that is unique between different people.




*converts the physical characteristic to set of metrics (measurements)

What are the 6 Biometrics Systems?

-Fingerprints


-Retina Scans (blood vein patter)


-Facial Scans (pattern)


-Voice recognition


-Handwriting dynamics


-Keyboard or keystroke dynamics (behavioral biometric systems)

What manages the biometric device configuration on a local computer or in a domain?

(WBF)




The Windows Biometic Framework, manages biometric device configuration on a local computer or in a domain.

Online identity integration, whats it do?

links Windows 7 authentication credential to Windows live, and possibly other providers (bing,MSN).

Can member of the Backup Operators group back up and restore files, if he does not have permissions to those files?

Yes, member can back up and restore files regardless of the user's permissions to those files.

Network Configuration Operators can do what?

-Modify the TCP/IP




-Renew and release TCP/IP addresses

What does Credential Manager do?

Saves account credentials when using Windows Explorer, Internet, or Remote Desktop Connection.

How to keep users from repeating passwords often

Enforce password history

require the users to change the password after a given length of time

Maximum password age

keeps user from changing password immediately after they've rest their passwords.

Minimum password age

passwords with a minimum of three of the four types of special characters (e.g..,lower case letters, uppercase, numbers, or !,@,#,$,%,^,&,*)

Password must meet complexity requirements

The length of time the account will be disabled (in minutes)

Account lockout duration

determines the number of attempts a user can make before the account is locked.

Account lockout threshould

Accounting group, open and view all files, edit them, and add new files. They should not be able to delete or rename files.


-Mary needs to be able to open and view files, but not modify them.


*Mary is member of accounting group.

Assign Allow Read & execute, List folder contents, Read, and Write to the accounting group.




For the Mary user account, Deny the Write permission.

The employee has just been fired, but not before he assigned Deny Full Control permission to Everyone to all the files and folders on the laptop.




All users, including you are now blocked from accessing these important files.




You are Admin and need files available.

Take ownership of the files, and change the permissions.




*Own of file can always change NTFS permissions,even when denied access to the file itself.Logging on as admin will not allow you to remove existing permission.Backup will allow, but slow way to do it.

You are owner of D:\Reports folder.




J needs to see files and subfolder. D needs to be able to do the same, but also delete folders.




What NTFS permissions?

Grant Read & Execute to J; Modify to D




*Read & Execute is minimumpermission to traverse folder (move through a folder to a subfolder), and Modify is the minimum permission to delete folder

To transferring folders from NTFS to FAT32 and keep existing permission?

Run the Convert command, followed by the xcopy command

Accounting group be able to open and view all files, edit them, add new files, and rename and or delete them




Mary needs to, open and view, but NOT modify the files, rename files, or delete them.




Mary is part of Accounting group. what NTFS with least amount of actions possible and affecting permissions as little as possible?

Remove Mary from the Accounting group. Assign Allow Read, & execute, List folder contents, Read, and Modify to the Accounting group. Assign Allow Read & execute, List folder contents, and Read to Mary.


*If you deny modify permission, it would also deny other permissions, that's why you remove from group.

Accounting group, open and view all files but NOT modify them.




Mary needs to be able to modify existing files in the folder, and new files to the folder, but should not be able to delete or rename files.




-Mary is a member in Accounting group


What NTFS permissions with least amount of actions possible.

Assign Allow Read & execute, List folder contents, and Read to the Accounting group.




Assign Allow Write to Mary.

D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permissions.




need to move to D:\Confidential folder. keep the exiting NTFS permissions.


What should you do?

Move the file to the new folder




* moving file or folder to a different location on the same NTFS partition , permissions are retained.

Mary is member of group that is given Allow Modify to To folder.




-Mary not allowed access to file in folder


-should be able to read,write, and create new files.


_ solution should not affect group abilities.

Edit the properties for the file; assign Mary the Deny Full Control permission.

You add Sally as a member of the Sales group, but she still cannot access the file that she needs.

Remove Sally from any other group that have been explicitly denied access to the folder.

With the Modify NTFS permissions.




You need to move the file from the existing folder on the D: drive to the C:\Report2 folder. You want to keep the existing NTFS permissions on file.


You want to accomplish this with the least amount of effort possible, what should you do?

Use the robocopy command to copy the file to the C:\Reports2 folder.




*robocopy or xcopy , maintain NTFS permissions (even when copying between partitions.)

You have a a small home network with the following coputers:



-Comp1 runs Windows 7 Home


-Comp2 runs Windows 7 Home Premium


-Comp3 runs Windows 7 Professional



You want to create a HomeGroup for your network. What should be apart of configuration?

-Set the network location to Home



-Create the HomeGroup on Comp2 or Comp3.



*To create you must run Windows 7 Home Premium or higher


*Network must be set to Home

What 4 things do you need to create a HomeGroup?

-Windows 7 Premium or Higher




-Computer cannot be a domain member




-Network location must be set to Home




-No other HomeGroup can exist on the network

What 3 things to join a HomeGroup ?

-Computer must be running Windows 7(any edition)




-Network location type must be Home




-Network Discovery must be on



You wan to restrict network and local access to only specific users.



All other users must not be able to view or modify the files in the folder



what 2 steps should you take?

-Place the files on an NTFS partition



-Configure both shared and NTFS permissions



*folder or file must be on NTF partition for permission to be active


You have a small network set up at home, You would like to share files such as pictures, videos, and music on your computer with other members.


Your mother should be able to modify any of these files, while everyone else should only have read-only access.


Simplest method to provide access specified?

-Enable file and printer sharing in the Network and sharing Center.



Share specific folders and configure the necessary permissions.



*Only the file and print sharing can you have enough control to grant different permissions to different users.

you share D:\Apps folder using the share name of Apps. You need to configure the following


-Members of the Appusers group should be able to open and view files in the shared folders.


-User John should not have any access to files i n shared folder. John is a member of the Appuser group.

Assign Allow Read permission to Appusers,




and assign Deny Read Permission to John.

You want to share the contents of a folder with other users over your network. Most users should have read-only access, but you want to explicitly deny access to other users.



What is the path steps to configure folder?

Right-click the folder and select Properties. Configure Advanced sharing on the Sharing tab.

One day you are downloading some new mp3 to your computer. What does the check mark next to folder identify?

The check mark next to the folder identifies where new library items are saved.

Mary is apart of Tgroup=Deny Full Control


And shes needs to be able to edit documents in the shared folder but cannot.




What are two possible solution?

-Remove the Mary user Account from T Group




-Change the Training group permission to allow Read.

Sales group need read-only, Sales Admin need open, edit and new files and folder. No other users should have access.




What should you do?

Grant Read permissions to Sales Group.


Change permissions to Sales Admin Group. Remove Everyone from the access control list.




*Granting Full Control to sales Admin, would grant too many permissions.

Sally is a member of both the Users and Sales group. She needs to be able to read and modify all files in the SalesDoc shared folder except for the StyleGuide.doc file. Sally should be able to read StyleGuide.doc but not modify it.


What should you do?

Set Sally's NTFS permission for StyleGuide.doc to Deny Write.

On Windows 7 You would like to join the HomeGroup from your laptop that has already been created on your home network.


What should you do?

Turn on Network Discovery.

You share the folder and give Everyone Full Control permission to the shared folder.


Users connect to the shared folder and report they can open the files , but they cannot modify any of the files.

Modify the NTFS permissions on the folder.

you mange small home network,


you want to share the following


-D:\Clipart


-D:\Fonts


-D:\VactionPictures


You want following requirments:


-User access folders through a single share.


-share should include these folders and no others


-The folders should remain in their current location in the file system structure.

Create a library. Add all folders to the library. share the library with the HomeGroup.

You want to prevent users from seeing this share when they browse the computers on the network. You still need to allow access to users who are authorized to use the share.


What should you do?

Stop sharing the folder. Share the folder again as Reorg$ with the same permissions as before.




* Share name with $ is a hidden share, and will not be displayed when browsing the network.

other computers on the network are not able to discover your computer?

change your computer to home so its not on a public network, this turns off network Discovery.

You have Windows 7 Home Premium.



You want to configure your computer to use a different default printer for each network.


What should you do first?

Upgrade your computer to Windows 7 Professional



*Location-aware printing requires windows 7 Professional, Ultimate, or Enterprise edition.


You have windows 7 Pro




You want to configure a different default printer to use when connected to your home network.




What should you do?

In Devices and Printers, click Manage default printers.

You have windows 7 Pro




You want to configure a different default printer to use when connected to your home network.




In Devices and Printers, you click Manage default printers. Your home wireless network does no appear in the list of available networks.

Connect to the wireless network




*to configure a default printer for a wireless network, you must have connected at least once to the wireless network.

You want only members of the sales group to print.

Remove Everyone from the printer's access control list




*By default, Everyone has the Allow Print permission to a printer.

you need to restrict access to the printer


-Sally needs to Print documents, and pause and resume her own print jobs.




-Damien needs to pause and resume documents for all users, but does not need to change printer properties

-Assign Sally the Print permission




-Assign Damien the Manage Documents permission.

You need to modify the permissions that apply to the shared printer for network users.




where do you go?

In Devices and Printers, right-click the printer and select Printer properties edit the Security settings.




*To modify printer permissions (for both local and network access), edit the settings on the security tab of the printer properties.

What are the three levels of Permission for printers?

-Print permission (print document, pause,resume, restart, and cancel their own documents, and connect to a printer.


-Manage Documents can perform all print task, as well as control job settings for all documents, and pause, resume, restart, and cancel the printing of any document


-Manage Printers permission can perform all tasks related to printers and printing.

Before the new auditing settings take effect, you must also enable ?

Audit: Force audit policy




subcategory settings (Windows Vista or later) to override audit policy category settings

Account management auditing tracks changes to user or group objects, including what 5 things?

-Create


-Rename


-Disable/enable


-Delete


-Change the password



Windows 7 includes advanced auditing categories give 4 examples?

-Credential Validation


-Account Lockout


-Certification Services


-Windows Filtering Platform (WFP)



What is Auditing ?

Auditing is the recording of system events and other system changes.

You want to identify denied attempts to change a user's group membership in a computer's local datebase.




What Audit Policy would that be?

Audit account management




*Audit account management events occur when user or group objects are created, deleted, or edited in computer database.

You would like to log all packets that are dropped by the firewall on your computer




What should you do?

Local security policy, configure object access polices for the (WFP) Windows Filtering Platform,


-view audit entries in the Security log in Event Viewer.

You enable Audit Object access policy to log failed events.


audit only failed attempts to view or modify registry setting. You no longer want to log audit entries and Modify actions.

Local Security Policy,stop auditing for the Audit object access policy. Enable Audit Registry advanced audit policy.

Audit Registry advanced policy allow control auditing for only ________without _______.

registry setting without logging file system access.

Computers are members of domain




You want to identify denied attempts to manipulate files on computers that have been secured through NTFS permissions.




What Audit policy?

Audit object access




*occurs when user accesses object with own access control list (file,folder, registry key, or printer).

identify when people attempt to log on with an incorrect password. You need the computer to note the fail attempts in its own audit log.

Enable the Audit account logon events settings.

Event is recorded any time a user successfully or unsuccessfully logs on. You do not want to record events related to logoff.

Configure advanced audit policies in the local security policy.




*standard Audit logon events and Audit account logon events policies track both log on and log off events.

You enable auditing of object access events.


You test it and no events are listed.


you want to make sure an event is listed in the Security log whenever one of your documents is modified.

Edit the advanced security properties of the folder containing you documents.




*In addition to enabling auditing of these types of events, you must also edit the properties of the specific objects you want to audit and define what type of access to object you will audit.

EFS stands for?

Encrypting File System



What windows 7 version is EFS available for ?

Professional, Enterprise, and Ultimate

EFS only works on what type of partitions?

NTFS

You need to move C:\Finance\Reports.xls file that's encrypted.


You need to move it to the D: that's FAT32




You need to keep contents encrypted




What should you do?

Convert command, followed by the xcopy command.




*Files copied or moved to FAT32 are uncrypted that's why, convert to NTFS.

You've been using EFS and a self-signed certificate.


You now want to use smart card. You installed card reader and obtain a smart card with a new certificate.


-You want to make sure all encrypted files use the certification on the smart card.


What do you do first?

Run rekeywiz




*When changing the certificate used encrypt files, run rekeywiz or cipher/rekey. This updates all encrypted files using the new certificate.

Windows 7 that's shared by 3 users. The computer is not a member of a domain. Each user has been using EFS to encrypt.


Want to use a user account as a recovery agent. You would like to store the recovery keys on a smart card


What should you do first?

Run cipher/r

What 3 steps to add Recovery agent to encrypted files for Home Group.



1.Run cipher /r to generate the recovery agent keys


2.Add Data Recovery Agent to the Encrypting File System policy in the local security policy. Use the certificate generated in step 1.


3.For each user, run the cipher /u command to update encrypted files and add the DRA to each file. Running this command updates only the current user's files.

Cipher /u

-Adds a recovery agent key


or


-updates (or adds) encryption keys

Cipher /r

Generates recovery agent keys

Cipher /k

Creates a new file encryption key

Cipher

Displays the Encryption state

Changes the certificate used to encrypt files

Cipher /rekey

Comp1 is XP Comp2 Win7




After moving EFS-encrypted files from Comp1 to Comp2, no one can open the files and access the data. You need to open the EFS-encrypted files on Comp1.


What are 2 possible solutions?

-Use USMT to transfer the encryption certificates.




-Use Cipher.exe to transfer the encryption certificates.

Is Credential Manager part of Windows XP?

NO and cannot transfer the certificates from computer.

Mary encrypts a file by using (EFS).You need to ensure that Mary can grant Mark access to the file.




What should you do?

Instruct Mark to log on to the computer and encrypt a file.




*When he encrypts a file (public key ) is generated on the computer, and will be available on list, whenMary tries to share her EFS File.

you have 2 computers part of a home group one computer shares file but the other cannot access cause its EFS.



What should you do?



Copy your private key from Comp1 to Comp2




*When sharing EFS-encrypted resources, each user must export their EFS keys to other computers in the HomeGroup.

member of domain.each user has EFS but you want use smartcard to save recovery keys.


You would like to add your user account to as a recovery agent. You install a smartcard reader obtain a new smart card with certificate that can be used for EFS recovery. You add a data recovery agent using Group Policy. what should you do next?

Have each user run cipher /U




*You don't need to perform cipher /r you already have a certificate you will use for the data recovery agent.

Rodney left the company. Manager Kate is trying to access a file that Rodeny encrypted using EFS. Kate informs you that she cannot open one or Rodeny's documents, receiving a access denied message.


You want to let Kate open the file.

-Log on to the laptop using an account with DRA privileges. Clear the Encrypt attribute on the file.

Windows 7 two computers, both part of domain.


domain user named EFS-Recovery


-You use the user account to recover some files on comp1


-You need to recover files on Comp2, but are unsuccessful.


What should you do?

Export the recovery agent Keys from Comp1 and import them to Comp2




*To use DRA keys must be accessible to the local computer.

Windows 7 NTFS partition.



You want to help Rodney encrypt the contents of the C:\Data folder so that KATE and Rodney are the only authorized users.

Instruct Rodney to log on, edit the properties of the C:\Data folder, and enable encryption. Add kate as an authorized user for each file in the C:\Data folder.

EFS Uses a form of ________key______, which utilizes a _________ and _______.

Uses Public Key cryptography, which utilizes a public and private key pair.




*an Encrypted pair of keys, one public other private.

The Public key is available to ?

anyone


The private key _______ the data that was _____ with the corresponding _________.

Private key decrypts the data that was encrypted with the corresponding public key

You can keep a copy of each users certificate and private key on?

Floppy disk or other removable media

What file format is used by default when Certificate Export Wizard creates back up keys?

.pfx

What does Branch Cache enable?

Branch Cache enables rapidly access data from remotely located file and Web servers.

When does Branch Cache become active?

Branch Cache becomes active when it take 80 milli secounds to get to server and back.

Once Branch Cache is active what does it three things does it check for?

-if requested data is cached or up-to-date


-Client has permission


-if Data is not cache its retrieved from the main server and cached in the branch office.

What are the two Branch Cache Modes?

-Hosted Cache




-Distributed Cache

How does Hosted Cache work?

Server located in branch office, hosts files cached from the remote server (Main office, Head quarters)

What are 3 requirements for Hosted Cache?

-Computers running windows Server 2008 to be configure in each branch office. That's at least 2 servers



-Each Client Configured with address of the Server configured in there Branch Cache Settings

Its not recommended to use Hosted Cache if ?

Organization or network does not have its own Active Directory Certificate

How does Distributed Cache Mode work?

Uses Peer caching to host branch office cache among clients running Windows 7 in Branch Office




*Doesn't require branch server.

What is the limit of Client computers on single subnet with Distributed Cache.

50 client computers

Configure BrachCache settings with ________ or ________command-line Utility.

Group Policy or netsh

on the command prompt what command to enable Branch Cache in the required mode?

netsh branchcache set options

to enable BranchCache distributed mode in command prompt

service mode=DISTRIBUTED






*first. ( type netsh brachcache set options) this allows command above to work

to enable BranchCache Hosted mode in command prompt

service mode=HOSTEDCLIENT LOCATION=




*first (netsh brachcache set opions). fqdn = fully qualified domain name.

to enable client to use local branch caching in command prompt

service mode=local





What are the 4 option types Connecting Direct Access Clients to the Network.

IP Address Client / Preferred Connection




-IPv6 - IPv6 addresss




-IPv4 - 6- to- 4




(NAT) IPV4 - Teredo




Unable use method - IP-HTTPS

What is Direct Access ?

Windows 7 and Windows Server 2008 R2 enables users to directly connect to corporate networks from any Internet connectionion

What type of access does Direct Access use ?

Direct Access uses IPv6

What are the 5 benefits of direct Access?

-Mobile Workforce-any internet connection


-Management of remote users-Group Policy


-Network security-use IPv6 over IPSec encryption , Globally routable ip address


-Access control capabilities-limit application or subnets


-Simplified network traffic- Direct Access separates its traffic from other Internet traffic

What 9 requirements for Direct Access client?

-client-Windows 7 Enterprise or Ultimate


-Windows Server 2008 R2


-Web Server (IIS) server feature Installed


-Install Direct Access Management Console


-Server with 2 network adapters 1 to network other to corporate intranet


-network adapter configured to internet must be configured with 2 consecutive IPv4 address


-Digital certificates obtain by (AD CS) configured as Enterprise Certification Certification Authority (CA)


-DNS with Windows Server 2008 (SP2 or R2)


-If UAG not in use and IPv4-Only, must have (NAT64)

Windows 7 ultimate, want to configure write access to removable drive is only allowed on drives protected with Bitlocker ToGo.



Configure the local security policy




*Group Policy Enable-Deny write access to removable drives that use Bitlocker

Hard drive has been encrypted using bitlocker uses TPM, PIN and Start Up key. You lost USB with start up key. You are unable to locate recovery key. You need to be able to boot the computer.

Reformat drive and reinstall Windows




*if lose both startup and recovery key

If you loose just the start up key you could use____________.

recover key to remove encryption

USB Thumb drive with BitLocker To Go Formatted FAT32 use Password to protect the drive.




You want Windows XP to be able to read and write files to the drive from computer running XP

Upgrade XP to Windows 7 Ultimate or Enterprise.




*read and write to Bit Locker to Go is Only Windows 7


Save with Windows 7 Ultimate or Enterprise

comp 1&2 configured with Bit Locker Both have TPM installed. Comp1 has hardware failure, Comp1 will not boot. You need access to that drive as quickly as possible?

Move Hard drive from Comp1 to Comp2 use the Recovery Key from Comp1 to gain access to the encrypted volume.

Windows 7, Laptop Computer member of domain. Want to use bitlocker.


Your implementation should meet the following


-Comp start Auto with out user intervention


-meet security requirements


-automatically generate and store keys in Central location.

-Implement BitLocker TPM




-Configure group policy to store recovery Keys on network location.

New Laptop, would like to use bit locker, laptop doesn't have TPM chip. Need to configure to use Bit Locker on new computer. What 2 primary things needed?

-Windows 7 Ultimate




-Configure Bit Locker to use start up key on USB.

You want to protect files on hard drive even if moved to other computer.

BitLocker

You hardware failure, that's been replaced now. BitLocker prevents System from starting because it has failed the start upsystem integrity check.


What should you do to reconfigure Bit locker?

Recovery Key

You want to save some files on USB thumb drive and protect drive using Bit Locker To Go




You want to be able to read these files on a computer that is running windows XP Professional You need to implement solution with least amount of effort (2 parts to solution)

-FAT 32


-Include Bitlocker ToGo




*When storing Bitlocker ToGo, store on unecrypted portion of the drive

Files Formatted NTFS and encrypted with bit locker can only be read by only by which OS?

Windows 7



You have computer protected by Bitlocker. You need to update the BIOS on the computer what should you do first.

Run manage-bde-pause




*Disable(pauses) Bitlocker for temporary maintenance.

Getting ready to install Windows 7 Ultimate on the new laptop to use Bit Locker. Laptop should start up without requiring a PIN or USB device during start up.


What 2 steps should you do?

-Enable the TPM




-Create two partitions on the hard disk.


- boot files on first Partition


-System files & data on second partition



Windows 7 Professional you want to protect hard drive using BitLocker




-Upgrade to Ultimate or Enterprise