Access Control & Identity Management Flashcards
What is the main drawback of most interesting detection systems?
A large number false alarm scanner curb because of abnormal weather conditions animals or in proper calibration.
Name the five intrusion detection system technologies
- Proximity detector – senses changes in the electromagnetic field that surrounds a small area or object.
- Motion detector – detects motion in a certain area.
- Photoelectric detector – senses changes in light patterns that indicates someone is in the area.
- Infrared detector- senses changes in the heat patterns of an area that indicate the presence of an intruder.
- Sound detector – senses sound and vibration and can detect changes in the noise level in an area.
What is read permissions?
You can read the contents of a file or directory.
What is view permissions?
View the contents of a directory ;users can see that a file exists this they won’t necessarily have permissions to read the contents of that file.
Write permissions?
Create and save a new file or write to an existing file.
Print permissions?
Print a file.
Copy permissions?
Copy a file from one location to another. The write permission would also be required in the destination directory.
Delete permissions?
Delete a file or directory.
Execute permissions?
Execute a program file or script.
Modify permissions?
Modify the attributes of a file or directory.
Move permissions?
Move a file from one location to another. The write permission would be required in the destination directory. The delete permission would be required to remove the file after the move is completed.
Name the three different security roles?
- Group
- User
- Role
What is a man-trap?
A man-trap describes a two tier physical access control method with two physical barriers such as doors between the person and the resource he is trying to access.
What is the difference between a smart card and a proximity reader question
A smart card must be swiped or inserted into a card reader a proximity reader is just passed in front of the card reader
What type of smartcard does DoD use?
DoD uses a common access card [CAC].
What is a mandatory access control model?
MAC is where the OS of the network is in control of access to data.
What is a discretionary access control model?
DAC allows the data owners to specify what users can access certain data.
What is role-based access control?
RBAC allows access to be based on the role the user holds within an organization.
What is Rule-based access control based on?
Rule-based access control is based on ACLs [access control list] else and is not necessarily tied to the identity of a user it provides access rules that are applied to all users in the organization.
Your organization has implemented a self-service password reset system. What does this provide?
(A) Password policy
(B) Certificate reset
(C) Password recovery
C - A self-service password reset system allows users to recover passwords without administrative intervention.
You are defining your overall access control model for the new network. To provide a strong default access policy, you want to make sure that users are given the absolute minimum access rights they need to perform their job function. Which access control principle does this follow? A. Implicit deny. B. Separation of duties C. Least privilege D. Role-based access control
Least privileged concept ensures that a user has only the access rights they need to perform their job functions.
You are creating access control model that will allow you to base specific access policies depending on which network a user is on, and not necessarily the actual identity of the specific user. Which privilege management access control model would you use? A. Rule-based access control B. discretionary access control C. Role-based access control D. Mandatory access control
Rule-based access control is defined with an access control list ACL which specifies a set of rules that must be followed before access is granted.
You must create an access control mechanism for your server and network room, which houses all your organization's servers and primary networking equipment. Which methods would be most secure? A. access list B. smart card access C. ID badge D. video surveillance
Smart card access would provide the most security the server room door will not unlock and unless a user inserts her smartcard and has the proper authorization to enter the room.
You are designing file security for a new file server for your sales department. Each user will have his own private and secure directory, and a shared group directory. Which of the following should be the initial default access level? A. Full access B. Read and write access C. No access D. Only read access
No access – you should use the principle of implicit deny.