study5 – Flashcard
Unlock all answers in this set
Unlock answersquestion
Which of the following terms is used to describe an event in which a person is denied access to a system when they should be allowed to enter?
answer
False Negative
question
Which form of access control enforces security based on user identities and allows individual users to define access controls over owned resources?
answer
DAC (Discretionary Access Control)
question
Discretionary Access Control (DAC) manages access to resources using what primary element or aspect?
answer
Identity
question
What is the star property of Bell-LaPadula?
answer
No write down
question
What is the simple property of Bell-LaPadula?
answer
No read up
question
What is the star property of Biba?
answer
No write up
question
What is the simple property of Biba?
answer
No read down
question
Which of the following is not an important aspect of password management?
answer
Enable account lockout
question
Which access control model manages rights and permissions based on job descriptions and responsibilities?
answer
Role Based Access Control
question
What security mechanism uses a unique list for each object embedded directly in the object itself that defines which subjects have access to certain objects and the level or type of access allowed?
answer
User ACL
question
What is the most important aspect of a biometric device?
answer
Accuracy
question
A device which is synchronized to an authentication server is which type of authentication?
answer
Synchronous token
question
Which of the following is the term for the process of validating a subject's identity?
answer
Authentication
question
What does the Mandatory Access Control (MAC) method used to control access?
answer
Sensitive labels
question
Which of the following are requirements to deploy Kerberos on a network? (Select two)
answer
-A centralized database of users and passwords -Time synchronization between devices
question
Which of the following is not used to oversee and/or improve the security performance of employees?
answer
Exit Interviews
question
Which form of authentication solution employs a hashed form of the user's password that has an added time stamp as a form of identity?
answer
Kerberos
question
Which of the following conditions is desirable when selecting a bio-metric system? (Select two)
answer
-A low crossover rate -A high processing rate
question
Which security principle prevents any one administrator from having sufficient access to compromise the security of the overall IT solution?
answer
Separation of duties
question
Need to know is required to access which types of resources?
answer
Compartmentalized resources
question
Which of the following is the best action to take to make remembering passwords easier so that a person no longer has to write the password down?
answer
Implement end-user training
question
You have implemented account lockout with a clipping level of 4. What will be the effect of this setting?
answer
The account will be locked after 4 incorrect attempts
question
In a variation of a brute force attack, an attacker may use a predefined list (dictionary) of commonly used usernames and passwords to gain access to existing user accounts. Which countermeasures best addresses this issue?
answer
A strong password policy
question
Which of the following defines the crossover rate for evaluating bio-metric systems?
answer
The point where the number of false positives matches the number of false negatives in the biometric system
question
Which of the following cloud computing systems will deliver software applications to a client either over the Internet or on a local area network?
answer
SaaS (Security as a Service)
question
Which of the following is an example of Type 1 authentication?
answer
Pass phrase
question
In which form of access control environment is access controlled by rules rather than by identity?
answer
MAC (Mandatory Access Control
question
In an Identity Management System, what is the function of the Identity Vault?
answer
Ensure that each employee has the appropriate level of access in the system
question
Which of the following is an example of a decentralized privilege management solution?
answer
Workgroup
question
Which of the following is the strongest form of multi-factor authentication?
answer
A password, a biometric scan, and a token device
question
Which of the following is stronger than any biometric authentication factor?
answer
A two factor authentication
question
Which of the following defines an object as used in access control?
answer
Data applications, systems, networks, and physical space
question
Which form of access control is based on job descriptions?
answer
Role-based access control (RBAC)
question
What type of password is maryhadalittlelamb?
answer
Pass phrase
question
In an Identity Management System, what is the function of the Authoritative Source?
answer
Specify the owner of a data item
question
Which of the following are disadvantages of biometrics? (Select two)
answer
-When used alone or solely, they are no more secure than a strong password -They require time synchronization
question
The Brewer-Nash model is designed primarily to prevent?
answer
Conflicts of interest
question
What is it called if the ACL automatically prevents access to anyone not on the list?
answer
Implicit deny
question
Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?
answer
PaaS delivers everything a developer needs to build an application onto the cloud infrastructure
question
What access control type is used to implement short-term repairs to restore basic functionality following an attack?
answer
Corrective
question
What is mutual authentication?
answer
A process by which each party in an online communication verifies the identity of the other party
question
What is another term for the type of logon credentials provided by a token device?
answer
One-time password
question
Which of the following are examples of single sign-on authentication solutions?
answer
SESAME Kerberos
question
Which of the following is not true regarding cloud computing
answer
Cloud computing requires end user knowledge of the physical location and configuration of the system that delivers the services
question
You have just configured the password policy and set the minimum password age to ten. What will be the effects of this configuration
answer
User cannot change the password for at least ten days
question
Which of the following is not an example of a single sign on solution?
answer
Workgroup
question
Which of the following controls is an example of a physical access control method?
answer
Locks on doors
question
Which of the following is an example of privilege escalation?
answer
Creeping privileges
question
Which of the following is not a characteristic of Kerberos?
answer
Peer-to-peer relationships between entities
question
The Clark-Wilson model is primarily based on?
answer
Controlled intermediary access applications
question
What should be done to a user account if the user goes on an extended vacation?
answer
Disable the account
question
Which of the following is a password that relates to things that people know, such as a mother's maiden name, or the name of a pet?
answer
Cognitive
question
A router access control list uses information in a packet such as the destination IP address and port number to make allow or deny forwarding decisions. This is an example of what type of access control mode?
answer
RBAC (based on rules)
question
Which type of access control focuses on assigning privileges based on security clearance and data sensitivity?
answer
MAC (Mandatory access control)
question
Which of the following advantages can Single Sign-On (SSO) provide? (Select two)
answer
-Access to all authorized resources with a single instance of authentication -The elimination of multiple user accounts and passwords for an individual
question
Seperation of duties is an example of which types of access control?
answer
Preventice
question
Encryption is what type of access control?
answer
Technical
question
What is the primary goal of separation of duties?
answer
Prevent conflicts of interest