Access Control Flashcards

1
Q

Access control methodology that only uses access control lists to maintain subject permissions for objects:

A

Discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the least reliable value for logical access control to use?

A

Physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is best paired with a password to provide improved security?

A

A biometric factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What AC methodology only uses ACL’s to maintain subject permissions for subjects

A

Discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the access control method where the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object.

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is best paired with a password to provide more secure authentication?

A

A biometric factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What would be the least reliable value for a logical access control to use?

A

Physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why would someone be opposed to Biometric Authentication?

A

Biometric authentication can reveal PII and medical information about a person (especially when using the iris and retinal patterns)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the CIA triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What function of the CIA triad does Hashing provide?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What function of the CIA triad does Cryptography provide?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What function of the CIA triad does Authentication provide?

A

Availability (to only the right people, ideally)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What authentication service grants access through tickets?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What AC model enforces permissions based on data labels?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What authentication service uses the X.500 spec?

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three most effective authentication factors?

A

Something you are, Something you know, Something you have

17
Q

What is Role Based Access Control?

A

A list of user roles matched with the levels of access they require to perform their function (often in a matrix)

18
Q

What does RADIUS stand for?

A

Remote Authentication Dial-In User Service

19
Q

What is Diameter?

A

A more powerful version of RADIUS (not backwards compatible) with much greater capability notably the use of Extensible Authentication Protocol.

20
Q

What is Role Based Access Control?

A

A list of rules defining user roles and the levels of access they require to perform their function

21
Q

What is need-to-know ideology?

A

If a person has sufficient privilege to view information but does not require that information for the execution of their duties, then they do not get access.

22
Q

List three Type 2 authentication inputs

A

Common Access Card (CAC), RFID Card, Token

23
Q

What is the benefit of De-centralized Access control?

A

Policy is easily adjusted to local laws and requirements

24
Q

What is summary of the Bell-La Padula Security model?

A

3 Rules

  • Simple: read access no read above your level
  • *: write access up, not down
  • strong *: no read/write
25
Q

What complexity constitutes a “strong” password?

A

8 characters minimum, with at least one of uppercase, lowercase, numbers and special characters.

26
Q

What principle should prevent any one person from performing multiple job functions that may allow them to commit fraud?

A

Separation of duties

27
Q

What type of password must be regenerated each time a user logs in?

A

One-time password

28
Q

What constitutes a strong password?

A

8 characters minimum, with at least one of uppercase, lowercase, numbers and special characters.

29
Q

If a contractor has an account (e-mail or login) within your organization, when should her access expire?

A

The day her contract expires.

30
Q

Why should an organization require administrators to disable user accounts of ex-employees?

A

To ensure that user keys are retained.

31
Q

What it is it an example of if you are required to use a thumbprint scan and PIN to gain access to a system?

A

Dual-factor authentication

32
Q

What type of authentication stores credentials in a central database and allows them to access multiple systems after logging on only one time?

A

Single Sign-on

33
Q

Who is ultimately responsible for the Information Security of an organization?

A

The data owner (CEO, Executive Director, etc.)