INSY 4312 Ch2 – Flashcards

Unlock all answers in this set

Unlock answers
question
Which form of access of control enforces security based on user identities and allows individual users to define access controls over owned resources?
answer
DAC (Discretionary Access Control)
question
Which type of access control enforces on assigning privileges based on security clearance and data sensitivity?
answer
MAC (Mandatory Access Control)
question
In which form of access control environment is access controlled by rules rather than by identity?
answer
MAC
question
You have implemented an access control method that allows only users who are managers to access specific data. Which type of access control model is used?
answer
RBAC (Role Based Access Control)
question
You have a system that allows the owner of a file to identify users and their permissions to the file. Which type of access control model is implemented?
answer
DAC
question
Which of the following is the term for the process of validating a subject's identity?
answer
Authentication
question
Which of the following is used for identification?
answer
Username
question
A remote access user needs to gain access resources on the server. Which of the processes are performed by the remote access server to control access to resources?
answer
Authentication and authorization
question
Which of the following defines an object as used in access control?
answer
Data, applications, systems, networks, and physical space.
question
Which access control model manages rights and permissions based on job descriptions and responsibilities?
answer
RBAC
question
Which is the star property of Bell-LaPadula?
answer
No write down
question
A Clark-Wilson model is primarily based on?
answer
Controlled intermediary access applications
question
The Brewer-Nash model designed primarily to prevent?
answer
Conflicts of interest
question
DAC manages access to resources using what primary element or aspect?
answer
Identity
question
What form of access control is based on job descriptions?
answer
RBAC
question
Which of the following is the strongest form of multi-factor authentication?
answer
A password, a biometric scan and a token device
question
Which of the following advantages can Single sign-on (SSO) provide?
answer
Access to all authorized resources with a single instance of authentication. The eliminations of multiple user accounts and passwords for an individual.
question
Which of the following is an example of two factor authentication?
answer
A token device and a PIN
question
Which of the following is an examples of three factor authentication?
answer
Token device, keystroke analysis, cognitive question
question
Which of the following are example of Type II authentication credentials?
answer
Smart card, photo id
question
Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter?
answer
False negative
question
Which of the following is a hardware device that contains identification info and which can be used to control building access or computer logon?
answer
Smart card
question
Match the authentication factor types
answer
Pin- something you know Smart card- something you have Password- something you know Retina scan- something you are Fingerprint scan- something you are Hardware token- something you have Username- something you know Voice recognition- something you are Wi-fi triangulation- somewhere you are Typing behaviors- something you do
question
Which of the following defines the crossover rate for evaluating biometric systems?
answer
The point where the number of false positive matches the number of false negative
question
Which of the following are examples of single sign on authentication solutions?
answer
Kerberos Sesame
question
Which of the following is stronger than any biometric authentication factor?
answer
A two-factor authentication
question
A device which is synchronized to an authentication server uses which type of authentication?
answer
Synchronous token
question
The mathematical algorithm used by HMAC-based One-time passwords (HOTP) relies on two types of info to generate a new password based on the previously generated password.
answer
Shared secret Counter
question
The mathematical algorithm used to generate time-based one-time passwords (TOTP) uses a shared secret and a counter to generate a unique, one time password. Which event causes the counter to increment?
answer
The passage of time
question
Which of the following info is typically not included in an access token?
answer
User account password
question
To give Marcus the access he need, you make his user account a member of the Managers group. Later, Marcus tells you that he is unable to access the files reserved for the managers group. What should you do?
answer
Have Marcus log off and log back on
question
Which of the following terms describes the component that is generated following authentication and which is used to gain access to resources following logon?
answer
Access token
question
Which security mechanism uses a unique list for each object embedded directly in the object itself that defines which subjects have access to certain objects and the level or type of access allowed?
answer
User ACL
question
Which of the following is an example of decentralized privilege management solution?
answer
Workgroup
question
Match the active directory component
answer
Holds a copy of the Active Directory database - domain controller Manages access for a workstation - computer object Manages access for an employee - user object Can be created to logically organize network resources - organizational unit Cannot be moved, rename, or deleted - generic container Defines a collection of network resources that share a common directory database - domain
question
Click on the object in the TESTOUTDEMO.com Active Directory domain that is used to manage desktop workstation access.
answer
CORPW57
question
What should be done to a user account if the user goes on an extended vacation?
answer
Disable the account
question
Tom's user account has been locked because he entered too many incorrect passwords. Click the tab in the properties of the Tom user object you would use to unlock his account.
answer
Account
question
Tom is transferred to the Tech Support department. You need to add Tom's user account to the Support Group in the Active Directory domain. Click the tab in the properties of Tom user object you would use to accomplish this.
answer
Member of
question
During account set up, you assigned a password to the new account. You know that for security reasons the system admin should not know any user's password. Click on the option you would use in the New Object - User dialog to remedy this situation.
answer
User must change password at next logon
question
Adding an employee. Currently, permission to network resources are assigned directly to Craig's user object. Because the new employee needs exactly the same level of access, you decide to simply copy Craig's Active Directory domain user object and rename it with the new employee's name. Will this work?
answer
No, permission are not copied when a user account is copied.
question
One of your users, Karen Scott, has recently remarried and is now Karen Jones. She has requested that her username be changed from kscott to kjones, but no other values change. Which of the following commands will accomplish this?
answer
Usermod -l kjones kscott
question
You have performed an audit and have found active accounts for employees who no longer work for the company. You want to disable those accounts. What command will disable a user account?
answer
Usermod -L joer
question
An employee named Bob Smith, with username bsmith, has left the company. Which of the following commands will deleted his user account along with his home directory?
answer
-usedel bsmith;rm -rf/home/bsmith -userdel -r bsmith
question
in the /etc/shadow file, which character in the password field indicated that a standard user account is locked?
answer
! or !!
question
Which of the following utilities would you typically use to lock a user account?
answer
-Usermod -passwd
question
you suspect that the gshant user account is locked. Which command will show the status of the user account?
answer
passwd -S gshant
question
you are the administrator for a small company. you need to add a new group of users, name sales, to the system. which command will accomplish this?
answer
groupadd sales
question
due to a merger with another company, standardization is now being imposed throughout the company. As a result, the sales group must be renamed marketing.
answer
groupmod -n marketing sales
question
you have a group names temp_sales on your system. the group is no longer needed, and you should remove the group.
answer
groupdel temp_sales
question
what is the effect of the following command? chane -M 60 -W 10 jsmith
answer
sets the password for jsmith to expire 60 days and gives a warning 10 days before it expires.
question
what change opion keeps a user from changing password every two weeks?
answer
-m 33
question
which of file should you edit to limit the amount of concurrent logins for a specific user?
answer
/etc/security/limits.conf
question
Within the /etc/security/limits.conf file, you notice the following entry: @guests hard maxlogins 3
answer
limits the number of max logins from the guest group to three
question
You want to ensure that all users in the Development OU have a common set of network communication security setting applied.
answer
create a GPO computer policy for the computers in the Development OU have a common set of network communication security setting applied.
question
Computer policies include a special category called user rights. Which action do they allow an admin to perform?
answer
identify users who can perform maintenance tasks on computers in an OU
question
which statement is true regarding application of GPO settings?
answer
If a setting is defined in the local group policy on the computer and not defined in the GPO linked to the OU, the setting will be applied.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New