Regularly audit the activities of systems administrators.
Audit systems to identify any unnecessary applications or evidence of suspicious activity.
When an employee is terminated, make sure that you understand their final actions. If possible, lock him or her out of the network.
Include statements in your security policy about malicious activity [e.g., logic bombs] perpetrated by systems administrators and company coders.
Regularly remind all potential attackers of your policy.
Hold an exit interview with the employee and clearly state policy concerning any malicious post-hire activity
Recommended textbook solutionsAmerican Government
1st EditionGlen Krutz
412 solutions
American Corrections
11th EditionMichael D. Reisig, Todd R. Clear
160 solutions
Criminal Justice in America
9th EditionChristina Dejong, Christopher E. Smith, George F Cole
105 solutions
Politics in States and Communities
15th EditionSusan A. MacManus, Thomas R. Dye
177 solutions
Upgrade to remove ads
Only SGD 41.99/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set [21]
What policy enforces renaming default accounts, so attackers cannot use known account names to access the system?
The 'Change default admin user' policy
What can cause a variety of problems such as corruptions, complete system crashes, and vulnerability to malware?
Outdated OS and software applications
What account, if enabled, allows anyone who does not hold their own user account access to your computer?
The Guest account
What policy can override all other regular password change policies?
Password never expires
If a user leaves their workstation unattended, what attack allows someone else to perform actions as though they were that user?
A lunchtime attack
What requires the user to explicitly allow executable code to run?
User Account Control [UAC]
You are reviewing the password and account policies for a company. What can you do to enforce ACL [Access Control List] policies and ensure that they are succeeding in enforcing effective permissions?
Restrict user permissions to least privilege to give them minimum necessary rights on the system.
What policy states that someone should be allocated the minimum necessary rights, privileges, or information to perform their role?
Least privilege
You are reviewing the password security policy for a company. What could cause a system being susceptible to brute force password cracking?
A weak password policy that allows non-complex passwords that are under 7 characters long
What is important in preventing hackers from successfully using dictionary attacks that contain popular words and phrases?
Use strong passwords for the entire system.
Which of these is NOT a way to lock a Windows computer?
Pressing WINDOWS+X
In a business environment, what will the Windows password security policy be set to?
The policy will require the user to sign in with a password.
What can be configured by the BIOS [Basic Input/Output System] or UEFI [Unified Extensible Firmware Interface] firmware setup program that is required before any operating system can boot, and does not require a server to authenticate?
A system user password
What policy specifies that if a maximum number of incorrect logon attempts within a certain period is reached, the server disables the account?
The Failed Attempts Lockout policy
What can happen if a user account violates a security policy?
The account may become locked.
What feature does Active Directory [AD] support to reverse deleting a user account?
Recycle Bin
What policy restricts access to a server by periodically checking whether the user has the right to continue using the network?
Logon Time Restrictions
What is a way the administrator can deny a user access to the network?
Disabling the user account
How can you protect confidentiality of data at-rest against physical theft of a hard drive?
Data encryption
What allows you to manage users, groups, and Organizational Units?
Active Directory Users and Computers
You are reviewing the password policy for a company. During your assessment, you discover the company's password complexity requirements require to only use letters and a minimum of 6 characters in length. What changes would you recommend making to the company's current password policy?
Require at least one special character or number and increase the minimum password length to 7.
Students also viewedCompTIA A+ 1002 [Core 2] - Sections 2.7 to 2.10
71 terms
6.0 Security Assessment
24 terms
CompTIA A+ 1002 [Core 2] - Sections 4.1 to 4.3
36 terms
CompTIA A+ 1002 [Core 2] - Sections 4.4…
47 terms
Sets found in the same folderCompTIA A+ 1002 [Core 2] - Sections 4.4…
47 terms
4.2
10 terms
2.2 Networking
19 terms
5.4 troubleshooting
15 terms
Other sets by this creatorstudy guide for javascript
6 terms
unit 15: 5.5
29 terms
unit 15: 1.3
19 terms
unit 15 1.2
10 terms
Recommended textbook solutionsPolitics in States and Communities
15th EditionSusan A. MacManus, Thomas R. Dye
177 solutions
American Government
1st EditionGlen Krutz
412 solutions
Government in America: Elections and Updates Edition
16th EditionGeorge C. Edwards III, Martin P. Wattenberg, Robert L. Lineberry
269 solutions
Criminal Justice in America
9th EditionChristina Dejong, Christopher E. Smith, George F Cole
105 solutions
Other Quizlet setsUnit 6 Biology Test Review
35 terms
Chapter 13 Wrap It Up Quiz
25 terms
Zombie Vacation- Political Organization of Space
25 terms
AWS Certified Solutions Architect Associate Practi…
53 terms