Access Control Flashcards
Main Concepts and Practice Questions
Which of the following is an example of Logical Access Control?
a) Using a proximity card to enter a building
b) Using a username and password to access a computer
c) Installing a security camera
d) Hiring a security guard
Answer:
b) Using a username and password to access a computer
Explanation:
Logical access control limits access to computer systems, networks, files, and data.
Using a username and password is a common method of logical access control.
Which component of access control is responsible for verifying the identity of a user?
a) Authorization
b) Access
c) Authentication
d) Audit
Answer:
c) Authentication
Explanation: Authentication is the process of proving an assertion, such as the identity of a user.
What is the purpose of the principle of least privilege?
a) To give all users the same level of access
b) To give users more access than they need
c) To minimize the risk of misuse of resources by granting users only the necessary access
d) To make access control management more complex
Answer:
c) To minimize the risk of misuse of resources by granting users only the necessary access
Explanation:
The principle of least privilege minimizes the risk of resource misuse by ensuring users only have the access they need to perform their job functions.
In the Lampson Access Matrix, what does a cell represent?
a) A subject
b) An object
c) The operations a subject can perform on an object
d) A security level
Answer:
c) The operations a subject can perform on an object
Explanation:
In the Access Matrix, each cell defines the operations that a specific subject can perform on a specific object.
What is a “Trojan horse” in the context of computer security?
a) A hardware device that controls access
b) A program that appears benign but has a malicious function
c) A type of access control model
d) A method of physical access control
Answer:
b) A program that appears benign but has a malicious function
Explanation:
A Trojan horse is a program that disguises itself as harmless but performs malicious actions.
Which of the following is a property of a reference monitor?
a) It can be easily modified by untrusted processes
b) It only checks access control policies occasionally
c) It is tamperproof
d) It does not need to be verifiable
Answer:
c) It is tamperproof
Explanation:
A reference monitor must be tamperproof to ensure that it cannot be bypassed or modified by unauthorized entities.
Which access control model assigns privileges based on rules specified by users?
a) Mandatory Access Control (MAC)
b) Discretionary Access Control (DAC)
c) Role-Based Access Control (RBAC)
d) Rule-Based Access Control (RuBAC)
Answer:
b) Discretionary Access Control (DAC)
Explanation:
DAC allows the owner or administrator of a resource to set policies for who is allowed access.
Which access control model uses roles and user groups to determine access privileges?
a) Mandatory Access Control (MAC)
b) Discretionary Access Control (DAC)
c) Role-Based Access Control (RBAC)
d) Rule-Based Access Control (RuBAC)
Answer:
c) Role-Based Access Control (RBAC)
Explanation:
RBAC assigns roles to subjects and configures access permissions at the role level.
Which access control model is well-suited for enforcing global policies in network equipment like firewalls?
a) Mandatory Access Control (MAC)
b) Discretionary Access Control (DAC)
c) Role-Based Access Control (RBAC)
d) Rule-Based Access Control (RuBAC)
Answer:
d) Rule-Based Access Control (RuBAC)
Explanation:
RuBAC uses rule lists that apply globally, making it suitable for network equipment and environments requiring strict global policies.
What is a key characteristic of Attribute-Based Access Control (ABAC)?
a) It relies solely on predefined roles.
b) It evaluates attributes at the time of attempted access.
c) It is less flexible than Role-Based Access Control.
d) It is not suitable for cloud environments.
Answer:
b) It evaluates attributes at the time of attempted access.
Explanation:
ABAC evaluates attributes in real-time, allowing for contextual and dynamic access control policies.
Which access control component involves validating personal identity documents?
a) Authorization
b) Access
c) Authentication
d) Audit
Answer:
c) Authentication
Explanation:
Authentication can involve validating identity documents to verify a person’s identity.
What does the ‘protection state’ in an access control system define?
a) The hardware components of the system
b) The users of the system
c) Permissions and policies
d) The physical location of the system
Answer:
c) Permissions and policies
Explanation:
The protection state defines the permissions (i.e., policy) and determines how security goals are met.
What is the primary function of an ‘enforcement mechanism’ in access control?
a) To define permissions
b) To manage user accounts
c) To enforce the protection state
d) To audit user activity
Answer:
c) To enforce the protection state
Explanation:
The enforcement mechanism enforces the protection state on the system.
In the context of access control, what does ‘complete mediation’ mean?
a) Bypassing access control checks for performance
b) Checking access control policy before every security-sensitive operation
c) Allowing users to modify access control policies
d) Delegating access control to users
Answer:
b) Checking access control policy before every security-sensitive operation
Explanation:
Complete mediation means that the access control policy is checked every time a security-sensitive operation is requested.
Which access control model is characterized by high security and consistency but also has drawbacks like a rigid format and manual burden?
a) Discretionary Access Control (DAC)
b) Mandatory Access Control (MAC)
c) Role-Based Access Control (RBAC)
d) Rule-Based Access Control (RuBAC)
Answer:
b) Mandatory Access Control (MAC)
Explanation:
MAC is known for its high security and consistency but can be rigid and require significant manual administration.
What is a disadvantage of Discretionary Access Control (DAC)?
a) Centralized security
b) Flexibility
c) Lack of security
d) Automation
Answer:
c) Lack of security
Explanation:
DAC’s flexibility can lead to weaker security due to its reliance on individual users to set access policies.
Which access control model is rule-based and commonly used in network equipment like firewalls?
a) Discretionary Access Control (DAC)
b) Mandatory Access Control (MAC)
c) Role-Based Access Control (RBAC)
d) Rule-Based Access Control (RuBAC)
Answer:
d) Rule-Based Access Control (RuBAC)
Explanation:
RuBAC uses rule lists to define access parameters and is commonly used in network devices.
What is the benefit of Role-Based Access Control (RBAC)?
a) Granular policies
b) Decentralized management
c) Intuitive policies
d) High management overhead
Answer:
c) Intuitive policies
Explanation:
RBAC provides intuitive policies, making it easier to understand and manage access privileges based on roles.
In Attribute-Based Access Control (ABAC), what is used to form policy rules?
a) User roles
b) Security levels
c) Attributes
d) Rule lists
Answer:
c) Attributes
Explanation:
ABAC uses attributes to define and qualify access parameters, offering more flexibility than role-based systems.
Which access control model is highly suitable for cloud and remote environments due to its flexibility and context-awareness?
a) Discretionary Access Control (DAC)
b) Mandatory Access Control (MAC)
c) Role-Based Access Control (RBAC)
d) Attribute-Based Access Control (ABAC)
Answer:
d) Attribute-Based Access Control (ABAC)
Explanation:
ABAC is well-suited for cloud and remote environments because it can handle complex rules and consider context.
What is the difference between physical and logical access control?
Answer:
Physical access control limits access to physical assets like buildings;
Logical access control limits access to digital assets like data and computer systems.
List the five components of access control.
Answer:
Authentication,
Authorization,
Access,
Manage,
and Audit.
Define “Authentication”.
Answer:
Authentication is the act of proving an assertion, such as the identity of a person or computer user.
Define “Authorization”.
Answer:
Authorization is the function of specifying access rights or privileges to resources.