Ch 1 ; 2 Access Control – Flashcards
Unlock all answers in this set
Unlock answersquestion
            Which security concept ensures that only authorized parties can access data?
answer
        Confidentiality
question
            Which form of access control enforces security based on user identities and allows individual users to define access controls over owned resources?
answer
        DAC
question
            What type of access control focuses on assigning privileges based on security clearance and data sensitivity?
answer
        MAC
question
            Which of the following principles is implemented in a mandotory access control model to determine access to an object using classification levels?
answer
        Need to Know
question
            In what form of access control environment is access controlled by rules rather than by identity?
answer
        MAC
question
            What form of access control is based on job descriptions?
answer
        RBAC role based access control
question
            You have a system that allows the owner of a file to identify users and their permissions to the file. Which type of access control model is implemented
answer
        DAC
question
            A router access control list uses informantion in a packet such as the destination IP address and port number to make allow or deny forwarding decisions.
answer
        RBAC rule based access control
question
            You have implemented an access control method that allows only users who are managers to access specfic data. Which type of access control model is used?
answer
        RBAC role based access control
question
            Which of the following is the most common form of authentication?
answer
        Password
question
            Is the strongest form of multi-factor authentication?
answer
        Password, biometric scan, and token device
question
            Which of the following advantages can Single Sign-On (SSO) provide?
answer
        The elimination of multiple user accounts and passwords for an individual. Access to all authorized resources with a single instance of authentication
question
            Which of the following is an example of a single sign-on authentication solution?
answer
        Kerberos
question
            Which of the following is an example of three-factor authentication?
answer
        Token device, keystroke analysis, congnitive question
question
            What are examples of Type II authentication credentials?
answer
        Smart Card and Photo ID
question
            What best describes one-factor authentication?
answer
        Multiple authentication credentials may be required, but they are all of the same type
question
            You maintain a network with four servers. Currently, users must provide authentication credentials whenever they access a different server. Which solution allows users to supply authentication credentials once for all servers?
answer
        SSO
question
            Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter?
answer
        False Negative
question
            What are the disadvantages of biometrics?
answer
        When used alone or solely, they are no more secure than a strong password. They have a potential for numerous false negatives.
question
            What is mutual authentication?
answer
        A process by which each party in an online communication verifies the identity of the other party
question
            What is the most important aspect of biometric device?
answer
        Accuracy
question
            What is the termfor the process of validating a subject's identity?
answer
        Authentication
question
            What is used for identification?
answer
        Username
question
            What is a example of identity proofing?
answer
        A bank verifies your address and government-issued ID card to create an online account
question
            What should be done to a suer account if the user goes on an extended vacation?
answer
        Disable the account
question
            What is a example of a strong Password?
answer
        should include upper, lower-case letters, numbers and, symbols
question
            In a variation of the brute force attack, an attacker may use a predefined list(dictionary) of commonly used usernames and passwords to gain access to existing user accounts. Which countermeasure best addresses this issue?
answer
        A strong password policy
question
            What is the single best rule to enforce when desiging complex passwords?
answer
        Longer Passwords
question
            For users on your network, you want to automatically lock their accounts if four incorrect passwords are used within 10 minutes. What should you do?
answer
        Configure account lockout policies in Group Policy
question
            You have hired 10 new tempory workers who will be with the company for 3 months. You want to make sure that after that time the user accounts cannot be used for logon. What should you do?
answer
        Configure account expiration in the user accounts
question
            You have hired 10 new temporary workers who will be with the company for 3 months. You want to make sure that these users can only log on during regular business hours. What should you do?
answer
        Configure day/time restrictions in the user accounts
question
            You want to give all managers the ability to view and edit a certain file. To do so, you need to edit the discretionary access control list (DACL) associated with the file. You want to be able to esily add and remove managers as their job poitions change. What is the best way to accomplish this?
answer
        Create a security group for the managers. Add all users as members of the group. Add the group to the file's DACL
question
            You have multiple users who are computer administrators. You want each administrator to be able to shut down systems and install drivers.
answer
        Grant the group the necessary user rights. Create a security group for the administrators: add all user accounts to the group.
question
            You have two folders that contain documents used by various departments: The Development group has been givent he Write permission tothe Design folder. The Sales grop has been given the write permission to the Products folder. User Mark Tilman needs to have the Read permission to the Design folder and the Write permission to the Poducts folder. You want to use groups as much as possible. What should you do?
answer
        Make mark a member of the Sales group; add Mark's user account directly to the ACL for the Design folder.
question
            What security mechanism uses a unique list for each object embedded directly in the object itself that defines which subjects to have access to certain objects and the level or type of access allowed?
answer
        User ACL
question
            Which of the following solutions would you use to control the actions that users can perform on a computer, such as shutting own the system, logging on through the network, or loading and unloading device drivers?
answer
        Group Policys
question
            For users who are members of the Sales team, you want to force thier computers to use a specific desktop background and remove access to administrative tools from the Start menu.
answer
        Group Policys
question
            Which of the following information is typically not included in an access token?
answer
        User Account password
question
            Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do?
answer
        Have Marcus log off and log back on
question
            What is the term that describes the component that is generated following authentication and which is used to gain access to resources following logon?
answer
        Access token
question
            Are solutions that address physical security?
answer
        Escort visitors at all times. Require indentification and name badges for all employees
question
            Which of the following is not an example of a physical barrieer access contro mechanism?
answer
        One time passwords
question
            Which of the following can be sued to stop piggybacking that has been occurring at a front entrance where employees should swipe their smart cards to gain entry?
answer
        Deploy a mantrap
question
            What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured enviroment but which actively pervents re-entrace through the exit portal?
answer
        Turnstiles
question
            What is the primary benefit of CCTV?
answer
        Expands the area visible by security guards
question
            You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?
answer
        PTZ
question
            You want to cuse CCTV to increase the physical security of your building. Which of the following camera types whould offer the sharpest image at the greatest distance under the lowest lighting conditions?
answer
        500 reslution, 50mm, .05 LUX
question
            Which of the following CCTV camera types lets you adjust the distance that the camera can see (i.e. zoom in or out)?
answer
        Varifocal
question
            Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter?
answer
        False Negative
question
            Which form of access control enforces security based on user identities and allows individual users to   define access controls over owned resources?
answer
        DAC (Discretionary Access Control)
question
            Discretionary Access Control (DAC) manages access to resources using what primary element or aspect?
answer
        Identity
question
            What is the star property of Bell-LaPadula?
answer
        No write down
question
            What is the simple property of Bell-LaPadula?
answer
        No read up
question
            What is the star property of Biba?
answer
        No write up
question
            What is the simple property of Biba?
answer
        No read down
question
            Which of the following is not an important aspect of password management?
answer
        Enable account lockout
question
            Which access control model manages rights and permissions based on job descriptions and responsibilities?
answer
        Role Based Access Control
question
            What security mechanism uses a unique list for each object embedded directly in the object itself that defines which subjects have access to certain objects and the level or type of access allowed?
answer
        User ACL
question
            What is the most important aspect of a biometric device?
answer
        Accuracy
question
            A device which is synchronized to an authentication server is which type of authentication?
answer
        Synchronous token
question
            Which of the following is the term for the process of validating a subject's identity?
answer
        Authentication
question
            What does the Mandatory Access Control (MAC) method used to control access?
answer
        Sensitive labels
question
            Which of the following are requirements to deploy Kerberos on a network? (Select two)
answer
        -A centralized database of users and passwords  -Time synchronization between devices
question
            Which of the following is not used to oversee and/or improve the security performance of employees?
answer
        Exit Interviews
question
            Which form of authentication solution employs a hashed form of the user's password that has an added   time stamp as a form of identity?
answer
        Kerberos
question
            Which of the following conditions is desirable when selecting a bio-metric system? (Select two)
answer
        -A low crossover rate  -A high processing rate
question
            Which security principle prevents any one administrator from having sufficient access to compromise   the security of the overall IT solution?
answer
        Separation of duties
question
            Need to know is required to access which types of resources?
answer
        Compartmentalized resources
question
            Which of the following is the best action to take to make remembering passwords easier so that a   person no longer has to write the password down?
answer
        Implement end-user training
question
            You have implemented account lockout with a clipping level of 4. What will be the effect of this setting?
answer
        The account will be locked after 4 incorrect attempts
question
            In a variation of a brute force attack, an attacker may use a predefined list (dictionary) of commonly used usernames and passwords to gain access to existing user accounts. Which countermeasures best addresses this issue?
answer
        A strong password policy
question
            Which of the following defines the crossover rate for evaluating bio-metric systems?
answer
        The point where the number of false positives matches the number of false negatives in the biometric system
question
            Which of the following cloud computing systems will deliver software applications to a client either over the Internet or on a local area network?
answer
        SaaS (Security as a Service)
question
            Which of the following is an example of Type 1 authentication?
answer
        Pass phrase
question
            In which form of access control environment is access controlled by rules rather than by identity?
answer
        MAC (Mandatory Access Control
question
            In an Identity Management System, what is the function of the Identity Vault?
answer
        Ensure that each employee has the appropriate level of access in the system
question
            Which of the following is an example of a decentralized privilege management solution?
answer
        Workgroup
question
            Which of the following is the strongest form of multi-factor authentication?
answer
        A password, a biometric scan, and a token device
question
            Which of the following is stronger than any biometric authentication factor?
answer
        A two factor authentication
question
            Which of the following defines an object as used in access control?
answer
        Data applications, systems, networks, and physical space
question
            Which form of access control is based on job descriptions?
answer
        Role-based access control (RBAC)
question
            What type of password is maryhadalittlelamb?
answer
        Pass phrase
question
            In an Identity Management System, what is the function of the Authoritative Source?
answer
        Specify the owner of a data item
question
            Which of the following are disadvantages of biometrics? (Select two)
answer
        -When used alone or solely, they are no more secure than a strong password  -They require time synchronization
question
            The Brewer-Nash model is designed primarily to prevent?
answer
        Conflicts of interest
question
            What is it called if the ACL automatically prevents access to anyone not on the list?
answer
        Implicit deny
question
            Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?
answer
        PaaS delivers everything a developer needs to build an application onto the cloud infrastructure
question
            What access control type is used to implement short-term repairs to restore basic functionality following an attack?
answer
        Corrective
question
            What is mutual authentication?
answer
        A process by which each party in an online communication verifies the identity of the other party
question
            What is another term for the type of logon credentials provided by a token device?
answer
        One-time password
question
            Which of the following are examples of single sign-on authentication solutions?
answer
        SESAME  Kerberos
question
            Which of the following is not true regarding cloud computing
answer
        Cloud computing requires end user knowledge of the physical location and configuration of the system that delivers the services
question
            You have just configured the password policy and set the minimum password age to ten. What will be the effects of this configuration
answer
        User cannot change the password for at least ten days
question
            Which of the following is not an example of a single sign on solution?
answer
        Workgroup
question
            Which of the following controls is an example of a physical access control method?
answer
        Locks on doors
question
            Which of the following is an example of privilege escalation?
answer
        Creeping privileges
question
            Which of the following is not a characteristic of Kerberos?
answer
        Peer-to-peer relationships between entities
question
            The Clark-Wilson model is primarily based on?
answer
        Controlled intermediary access applications
question
            What should be done to a user account if the user goes on an extended vacation?
answer
        Disable the account
question
            Which of the following is a password that relates to things that people know, such as a mother's maiden name, or the name of a pet?
answer
        Cognitive
question
            A router access control list uses information in a packet such as the destination IP address and port number to make allow or deny forwarding decisions. This is an example of what type of access control mode?
answer
        RBAC (based on rules)
question
            Which type of access control focuses on assigning privileges based on security clearance and data sensitivity?
answer
        MAC (Mandatory access control)
question
            Which of the following advantages can Single Sign-On (SSO) provide? (Select two)
answer
        -Access to all authorized resources with a single instance of authentication  -The elimination of multiple user accounts and passwords for an individual
question
            Seperation of duties is an example of which types of access control?
answer
        Preventice
question
            Encryption is what type of access control?
answer
        Technical
question
            What is the primary goal of separation of duties?
answer
        Prevent conflicts of interest
question
            Which of the following is used for identification?
answer
        Username
question
            The Brewer-Nash model is designed primarily to prevent?
answer
        Conflicts of interest
question
            In which form of access control environment is access controlled by rules rather than by identity?
answer
        MAC
question
            Which type of access control focuses on assigning privileges based on security clearance and data sensitivity?
answer
        MAC (Mandatory Access Control)
question
            The Clark-Wilson model is primarily based on?
answer
        Controlled intermediary access applications
question
            Which access control model manages rights and permissions based on job descriptions and responsibilities?
answer
        Role Based Access Control (RBAC)
question
            Which of the following is the term for the process of validating a subject's identity?
answer
        Authentication
question
            You have implemented an access control method that allows only users who are managers to access specific data. Which type of access control model is used?
answer
        RBAC (Role-based access control)
question
            What form of access control is based on job descriptions?
answer
        Role-based access control (RBAC)
question
            You have a system that allows the owner of a file to identify users and their permissions to the file. Which type of access control model is implemented
answer
        DAC (Discretionary Access Control)
question
            Which is the star property of Bell-LaPadula?
answer
        No write down
question
            Which of the following defines an object as used in access control?
answer
        Data, applications, systems, networks, and physical space.
question
            Which form of access control enforces security based on user identities and allows individual users to define access controls over owned resources?
answer
        DAC (Discretionary Access Control)
question
            Discretionary Access Control (DAC) manages access to resources using what primary element or aspect?
answer
        Identity
question
            A remote access user needs gain access to resources on the server. Which of the process are performed by the remote access server to control access to resources?
answer
        Authentication and authorization
question
            Separation of duties is an example of which type of access control?
answer
        Preventive
question
            You want to make sure that any reimbursement checks issued by your company cannot be issued by a single person. Which principle should you implement to accomplish this goal?
answer
        Separation of duties
question
            An access control list (ACL) contains a list of users and allowed permissions. What is it called if the ACL automatically prevents access to anyone not on the list?
answer
        Implicit deny
question
            Which of the following is an example of privilege escalation?
answer
        Creeping privileges
question
            Which security principle prevents any one administrator from having sufficient access to compromise the security of the overall IT solution?
answer
        Separation of duties
question
            What is the primary purpose of separation of duties?
answer
        Prevent conflicts of interest
question
            Which of the following principles is implemented in a mandatory access control model to determine access to an object using classification levels?
answer
        Need to know
question
            You are concerned that the accountant in your organization might have the chance to modify the books and steal from the company. You want to periodically have another person take over all accounting responsibilities to catch any irregularities.
answer
        Job rotation
question
            Which type of media preparation is sufficient for media that will be reused in a different security context with your organization?
answer
        Sanitization
question
            Need to know is required to access which types of resources?
answer
        Compartmentalized resources
question
            You want to implement an access control list where only the users you specifically authorize have access to the resource. Anyone not on the list should be prevented from having access.
answer
        Explicit allow, implicit deny
question
            By assigning access permissions so that users can only access those resources which are required to accomplish their specific work tasks, you would be in compliance with?
answer
        Principle of least privilege