3 - Access Control Flashcards
- Authorization is often characterized by?a. An audit logb. A biometricc. A security label or classificationd. A challenge response token
C: Authorization is often characterized by a security label or classification.
- Which of the following can be used as either an identification or authentication factors?a. Employee codeb. Usernamec. Challenge-response tokend. Biometric
D: A biometric can be used as either an identification or an authentication factor.
- A fingerprint is an example of what type of authentication factor?a. Type 1b. Type 2c. Type 3d. Type 4
C: A fingerprint is an example of a Type 3 authentication factor - something you are.
- Something you have is what type of authentication factor?a. Type 1b. Type 2c. Type 3d. Type 4
B: Something you have is a Type 2 authentication factor.
- What are the three fundamental principles of security?a. Confidentiality, Integrity, Availabilityb. Authentication, Authorization, Accountabilityc. Accessibility, Integrity, Secrecyd. Privacy, Control, Prevention
A: The three fundamental principles of security are Confidentiality, Integrity, and Availability.
- What is the process of verifying the identify of a subject?a. Authorizationb. Authenticationc. Auditingd. Accountability
B: The process of identify verification is authentication.
- The most secure form of password is which of the following?a. Static passwordb. Dynamic passwordc. One time passwordd. Cognitive password
C: A one time password is the most secure type of password, since it is used only once then it becomes invalid. One-time passwords are a form of dynamic passwords. However, not all types of dynamic passwords are as secure as a one-time password.
- The False Acceptance Rate (Type II) error of a biometric device indicates what?a. The rate at which authorized users are not granted accessb. The rate at which authorized users are granted accessc. The rate at which unauthorized users are not granted accessd. The rate at which unauthorized users are granted access
D: A False Acceptance Rate (a Type II) error of a biometric device indicates the rate at which unauthorized users are granted access.
- A secure access control mechanism will default to?a. No accessb. Minimal accessc. Least privileged. Need to know access
A: A secure access control mechanism will default to no access.
- What is the primary disadvantage of single sign on?a. Password management and administrationb. Users can roam the network without further interactive authenticationc. User work task prohibitived. Length of time required to perform logon
B: The primary disadvantage of single sign on is that users can roam the network without further interactive authentication, less security is involved.
- A Type 1 authentication factor is also known as?a. Something you knowb. Something you havec. Something you ared. Something you do
A: A Type 1 authentication factor is something you know.
- Auditing is dependant upon all but which of the following?a. Identificationb. Accountabilityc. Authorizationd. Authentication
B: Auditing is not dependant upon accountability. In fact, accountability is dependant upon auditing. Accountability is the result of the mechanisms of identification, authentication, authorization, access control, and auditing which is used to hold people responsible for their online activities.
- When two types of authentication are employed to provide improved security, this is known as?a. Challenge-response authenticationb. One-time authenticationc. Single sign-ond. Two-factor authentication
D: The use of two forms of authentication is known as two-factor authentication.
- What type of password offers the best security possible for password-based authentication?a. One-time passwordsb. Static passwordsc. Dynamic passwordsd. Passphrases
A: One-time passwords offer the best security for password based authentication.
- Authorization can be illustrated by all but which of the following?a. need to knowb. access control matrixc. security labeld. password
D: A password is an example of an authentication factor, not an authorization method.
- Which of the following is not an example of a logical access control?a. Perimeter pad locked gatesb. Restricted database interfacesc. Forced logons to the operation systemd. Centralized remote access authentication services
A: Perimeter pad locked gates is an example of physical access control.
- Which of the following is not typically considered an identification factor?a. account numberb. passwordc. biometric featured. employee identification
B: A password is usually considered an authentication factor.
- Which of the following is usually not labeled as an entity that serves as a subject and an object?a. userb. databasec. programd. computers
A: Users are usually labeled only as subjects.
- Which of the follow is the act of providing the who of a subject and is the first step in establishing accountability?a. Authorizationb. Identificationc. Auditingd. Non-repudiation
B: Identification establishes the who of a subject and is the first step in establishing accountability.
- Which of the following represents the activity of verifying the claimed identity of a subject?a. authorizationb. accountabilityc. authenticationd. availability
C: Authentication represents the activity of verifying the claimed identity of a subject.
- A password is an example of what type of authentication factor?a. Type 1b. Type 2c. Type 3d. Type 4
A: A password is an example of a Type 1: something you know authentication factor.
- A Type 3 authentication factor is?a. Something you haveb. Something you arec. Something you knowd. Something you provide
B: A fingerprint is an example of a Type 3: something you are authentication factor.
- Which form of password may require unique or different interactions or responses from the subject each time they attempt to logon?a. static passwordb. dynamic passwordc. cognitive passwordd. passphrase
C: A cognitive password is a collection of question and answers that only the subject will know. A random Selection from the databank of available queries will be employed at each logon.
- Which of the following is also a dynamic password?a. passphraseb. PINc. smart cardd. one time password
D: A one time password is a form of dynamic password.