Chapter 11 Flashcards

1
Q

A user or a process functioning on behalf of the user that attempts to access an object is known as the

A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The action that is taken by a subject over an object is called a(n):

A

Operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the name for a predefined framework that can be used for controlling access, and is embedded
into software and hardware?

A

Access Control Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What access control model below is considered to be the most restrictive access control model, and
involves assigning access controls to users strictly according to the custodian?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a UAC prompt, what color is used to indicate the lowest level of risk?

A

Gray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which access control model is considered to be the least restrictive?

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Select below the access control model that uses access based on a user’s job function within an
organization:

A

Role Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which access control model can dynamically assign roles to subjects based on a set of defined rules?

A

Rule Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When using Role Based Access Control (RBAC), permissions are assigned to:

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A vulnerable process that is divided between two or more individuals to prevent fraudulent
application of the process is known as:

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A list that specifies which subjects are allowed to access an object and what operations they can
perform on it is referred to as a(n):

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

User accounts that remain active after an employee has left an organization are referred to as being
what type of accounts?

A

Orphaned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To assist with controlling orphaned and dormant accounts, what can be used to indicate when an
account is no longer active?

A

Account expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Although designed to support remote dial-in access to a corporate network, what service below is
commonly used with 802.1x port security for both wired and wireless LANs?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

During RADIUS authentication, what type of packet includes information such as identification of a
specific AP that is sending the packet and the username and password?

A

authentication request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Select below the authentication system developed by the Massachusetts Institute of Technology
(MIT) to verify the identity of network users:

17
Q

What authentication service commonly used on UNIX devices involves communicating user
authentication information to a centralized server?

18
Q

Entries within a Directory Information Base are arranged in a tree structure called the:

19
Q

The X.500 standard defines a protocol for a client application to access an X.500 directory known as
which of the following options?

20
Q

What kind of attack allows for the construction of LDAP statements based on user input statements,
which can then be used to access the LDAP database or modify the database’s information?

A

LDAP injection