INSY 4312 Ch2 – Flashcards
Unlock all answers in this set
Unlock answersquestion
            Which form of access of control enforces security based on user identities and allows individual users to define access controls over owned resources?
answer
        DAC (Discretionary Access Control)
question
            Which type of access control enforces on assigning privileges based on security clearance and data sensitivity?
answer
        MAC (Mandatory Access Control)
question
            In which form of access control environment is access controlled by rules rather than by identity?
answer
        MAC
question
            You have implemented an access control method that allows only users who are managers to access specific data. Which type of access control model is used?
answer
        RBAC (Role Based Access Control)
question
            You have a system that allows the owner of a file to identify users and their permissions to the file. Which type of access control model is implemented?
answer
        DAC
question
            Which of the following is the term for the process of validating a subject's identity?
answer
        Authentication
question
            Which of the following is used for identification?
answer
        Username
question
            A remote access user needs to gain access resources on the server. Which of the processes are performed by the remote access server to control access to resources?
answer
        Authentication and authorization
question
            Which of the following defines an object as used in access control?
answer
        Data, applications, systems, networks, and physical space.
question
            Which access control model manages rights and permissions based on job descriptions and responsibilities?
answer
        RBAC
question
            Which is the star property of Bell-LaPadula?
answer
        No write down
question
            A Clark-Wilson model is primarily based on?
answer
        Controlled intermediary access applications
question
            The Brewer-Nash model designed primarily to prevent?
answer
        Conflicts of interest
question
            DAC manages access to resources using what primary element or aspect?
answer
        Identity
question
            What form of access control is based on job descriptions?
answer
        RBAC
question
            Which of the following is the strongest form of multi-factor authentication?
answer
        A password, a biometric scan and a token device
question
            Which of the following advantages can Single sign-on (SSO) provide?
answer
        Access to all authorized resources with a single instance of authentication.  The eliminations of multiple user accounts and passwords for an individual.
question
            Which of the following is an example of two factor authentication?
answer
        A token device and a PIN
question
            Which of the following is an examples of three factor authentication?
answer
        Token device, keystroke analysis, cognitive question
question
            Which of the following are example of Type II authentication credentials?
answer
        Smart card, photo id
question
            Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter?
answer
        False negative
question
            Which of the following is a hardware device that contains identification info and which can be used to control building access or computer logon?
answer
        Smart card
question
            Match the authentication factor types
answer
        Pin- something you know  Smart card- something you have   Password- something you know   Retina scan- something you are   Fingerprint scan- something you are   Hardware token- something you have   Username- something you know   Voice recognition- something you are   Wi-fi triangulation- somewhere you are  Typing behaviors- something you do
question
            Which of the following defines the crossover rate for evaluating biometric systems?
answer
        The point where the number of false positive matches the number of false negative
question
            Which of the following are examples of single sign on authentication solutions?
answer
        Kerberos   Sesame
question
            Which of the following is stronger than any biometric authentication factor?
answer
        A two-factor authentication
question
            A device which is synchronized to an authentication server uses which type of authentication?
answer
        Synchronous token
question
            The mathematical algorithm used by HMAC-based One-time passwords (HOTP) relies on two types of info to generate a new password based on the previously generated password.
answer
        Shared secret   Counter
question
            The mathematical algorithm used to generate time-based one-time passwords (TOTP) uses a shared secret and a counter to generate a unique, one time password. Which event causes the counter to increment?
answer
        The passage of time
question
            Which of the following info is typically not included in an access token?
answer
        User account password
question
            To give Marcus the access he need, you make his user account a member of the Managers group. Later, Marcus tells you that he is unable to access the files reserved for the managers group. What should you do?
answer
        Have Marcus log off and log back on
question
            Which of the following terms describes the component that is generated following authentication and which is used to gain access to resources following logon?
answer
        Access token
question
            Which security mechanism uses a unique list for each object embedded directly in the object itself that defines which subjects have access to certain objects and the level or type of access allowed?
answer
        User ACL
question
            Which of the following is an example of decentralized privilege management solution?
answer
        Workgroup
question
            Match the active directory component
answer
        Holds a copy of the Active Directory database - domain controller    Manages access for a workstation - computer object    Manages access for an employee - user object    Can be created to logically organize network resources - organizational unit    Cannot be moved, rename, or deleted - generic container    Defines a collection of network resources that share a common directory database - domain
question
            Click on the object in the TESTOUTDEMO.com Active Directory domain that is used to manage desktop workstation access.
answer
        CORPW57
question
            What should be done to a user account if the user goes on an extended vacation?
answer
        Disable the account
question
            Tom's user account has been locked because he entered too many incorrect passwords. Click the tab in the properties of the Tom user object you would use to unlock his account.
answer
        Account
question
            Tom is transferred to the Tech Support department. You need to add Tom's user account to the Support Group in the Active Directory domain. Click the tab in the properties of Tom user object you would use to accomplish this.
answer
        Member of
question
            During account set up, you assigned a password to the new account. You know that for security reasons the system admin should not know any user's password. Click on the option you would use in the New Object - User dialog to remedy this situation.
answer
        User must change password at next logon
question
            Adding an employee. Currently, permission to network resources are assigned directly to Craig's user object. Because the new employee needs exactly the same level of access, you decide to simply copy Craig's Active Directory domain user object and rename it with the new employee's name. Will this work?
answer
        No, permission are not copied when a user account is copied.
question
            One of your users, Karen Scott, has recently remarried and is now Karen Jones. She has requested that her username be changed from kscott to kjones, but no other values change. Which of the following commands will accomplish this?
answer
        Usermod -l kjones kscott
question
            You have performed an audit and have found active accounts for employees who no longer work for the company. You want to disable those accounts. What command will disable a user account?
answer
        Usermod -L joer
question
            An employee named Bob Smith, with username bsmith, has left the company. Which of the following commands will deleted his user account along with his home directory?
answer
        -usedel bsmith;rm -rf/home/bsmith  -userdel -r bsmith
question
            in the /etc/shadow file, which character in the password field indicated that a standard user account is locked?
answer
        ! or !!
question
            Which of the following utilities would you typically use to lock a user account?
answer
        -Usermod  -passwd
question
            you suspect that the gshant user account is locked. Which command will show the status of the user account?
answer
        passwd -S gshant
question
            you are the administrator for a small company. you need to add a new group of users, name sales, to the system. which command will accomplish this?
answer
        groupadd sales
question
            due to a merger with another company, standardization is now being imposed throughout the company. As a result, the sales group must be renamed marketing.
answer
        groupmod -n marketing sales
question
            you have a group names temp_sales on your system. the group is no longer needed, and you should remove the group.
answer
        groupdel temp_sales
question
            what is the effect of the following command? chane -M 60 -W 10 jsmith
answer
        sets the password for jsmith to expire 60 days and gives a warning 10 days before it expires.
question
            what change opion keeps a user from changing password every two weeks?
answer
        -m 33
question
            which of file should you edit to limit the amount of concurrent logins for a specific user?
answer
        /etc/security/limits.conf
question
            Within the /etc/security/limits.conf file, you notice the following entry: @guests hard maxlogins 3
answer
        limits the number of max logins from the guest group to three
question
            You want to ensure that all users in the Development OU have a common set of network communication security setting applied.
answer
        create a GPO computer policy for the computers in the Development OU have a common set of network communication security setting applied.
question
            Computer policies include a special category called user rights. Which action do they allow an admin to perform?
answer
        identify users who can perform maintenance tasks on computers in an OU
question
            which statement is true regarding application of GPO settings?
answer
        If a setting is defined in the local group policy on the computer and not defined in the GPO linked to the OU, the setting will be applied.
