What can help prevent hackers from successfully using dictionary attacks quizlet?

Regularly audit the activities of systems administrators.

Audit systems to identify any unnecessary applications or evidence of suspicious activity.

When an employee is terminated, make sure that you understand their final actions. If possible, lock him or her out of the network.

Include statements in your security policy about malicious activity [e.g., logic bombs] perpetrated by systems administrators and company coders.

Regularly remind all potential attackers of your policy.

Hold an exit interview with the employee and clearly state policy concerning any malicious post-hire activity

Recommended textbook solutions

American Government

1st EditionGlen Krutz

412 solutions

American Corrections

11th EditionMichael D. Reisig, Todd R. Clear

160 solutions

Criminal Justice in America

9th EditionChristina Dejong, Christopher E. Smith, George F Cole

105 solutions

Politics in States and Communities

15th EditionSusan A. MacManus, Thomas R. Dye

177 solutions

Upgrade to remove ads

Only SGD 41.99/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set [21]

What policy enforces renaming default accounts, so attackers cannot use known account names to access the system?

The 'Change default admin user' policy

What can cause a variety of problems such as corruptions, complete system crashes, and vulnerability to malware?

Outdated OS and software applications

What account, if enabled, allows anyone who does not hold their own user account access to your computer?

The Guest account

What policy can override all other regular password change policies?

Password never expires

If a user leaves their workstation unattended, what attack allows someone else to perform actions as though they were that user?

A lunchtime attack

What requires the user to explicitly allow executable code to run?

User Account Control [UAC]

You are reviewing the password and account policies for a company. What can you do to enforce ACL [Access Control List] policies and ensure that they are succeeding in enforcing effective permissions?

Restrict user permissions to least privilege to give them minimum necessary rights on the system.

What policy states that someone should be allocated the minimum necessary rights, privileges, or information to perform their role?

Least privilege

You are reviewing the password security policy for a company. What could cause a system being susceptible to brute force password cracking?

A weak password policy that allows non-complex passwords that are under 7 characters long

What is important in preventing hackers from successfully using dictionary attacks that contain popular words and phrases?

Use strong passwords for the entire system.

Which of these is NOT a way to lock a Windows computer?

Pressing WINDOWS+X

In a business environment, what will the Windows password security policy be set to?

The policy will require the user to sign in with a password.

What can be configured by the BIOS [Basic Input/Output System] or UEFI [Unified Extensible Firmware Interface] firmware setup program that is required before any operating system can boot, and does not require a server to authenticate?

A system user password

What policy specifies that if a maximum number of incorrect logon attempts within a certain period is reached, the server disables the account?

The Failed Attempts Lockout policy

What can happen if a user account violates a security policy?

The account may become locked.

What feature does Active Directory [AD] support to reverse deleting a user account?

Recycle Bin

What policy restricts access to a server by periodically checking whether the user has the right to continue using the network?

Logon Time Restrictions

What is a way the administrator can deny a user access to the network?

Disabling the user account

How can you protect confidentiality of data at-rest against physical theft of a hard drive?

Data encryption

What allows you to manage users, groups, and Organizational Units?

Active Directory Users and Computers

You are reviewing the password policy for a company. During your assessment, you discover the company's password complexity requirements require to only use letters and a minimum of 6 characters in length. What changes would you recommend making to the company's current password policy?

Require at least one special character or number and increase the minimum password length to 7.

Students also viewed

CompTIA A+ 1002 [Core 2] - Sections 2.7 to 2.10

71 terms

6.0 Security Assessment

24 terms

CompTIA A+ 1002 [Core 2] - Sections 4.1 to 4.3

36 terms

CompTIA A+ 1002 [Core 2] - Sections 4.4…

47 terms

Sets found in the same folder

CompTIA A+ 1002 [Core 2] - Sections 4.4…

47 terms

4.2

10 terms

2.2 Networking

19 terms

5.4 troubleshooting

15 terms

Other sets by this creator

study guide for javascript

6 terms

unit 15: 5.5

29 terms

unit 15: 1.3

19 terms

unit 15 1.2

10 terms

Recommended textbook solutions

Politics in States and Communities

15th EditionSusan A. MacManus, Thomas R. Dye

177 solutions

American Government

1st EditionGlen Krutz

412 solutions

Government in America: Elections and Updates Edition

16th EditionGeorge C. Edwards III, Martin P. Wattenberg, Robert L. Lineberry

269 solutions

Criminal Justice in America

9th EditionChristina Dejong, Christopher E. Smith, George F Cole

105 solutions

Other Quizlet sets

Unit 6 Biology Test Review

35 terms

Chapter 13 Wrap It Up Quiz

25 terms

Zombie Vacation- Political Organization of Space

25 terms

AWS Certified Solutions Architect Associate Practi…

53 terms

What is important in preventing hackers from successfully using dictionary attacks that contain popular words and phrases?

These days, even though dictionary attacks are getting sophisticated, it is possible to prevent them by using passwords having both uppercase and lowercase letters along with special characters and random combinations.

How can you protect confidentiality of data at rest against physical theft of a hard drive?

For protecting data at rest, enterprises can simply encrypt sensitive files prior to storing them and/or choose to encrypt the storage drive itself.

What can control network traffic based on access rules permitting or denying certain IPS and network ports?

A firewall policy defines how an organization's firewalls should handle inbound and outbound network traffic for specific IP addresses and address ranges, protocols, applications, and content types based on the organization's information security policies.

Chủ Đề