Chapter 11 Flashcards
A user or a process functioning on behalf of the user that attempts to access an object is known as the
Subject
The action that is taken by a subject over an object is called a(n):
Operation
What is the name for a predefined framework that can be used for controlling access, and is embedded
into software and hardware?
Access Control Model
What access control model below is considered to be the most restrictive access control model, and
involves assigning access controls to users strictly according to the custodian?
Mandatory Access Control
In a UAC prompt, what color is used to indicate the lowest level of risk?
Gray
Which access control model is considered to be the least restrictive?
Discretionary Access Control
Select below the access control model that uses access based on a user’s job function within an
organization:
Role Based Access Control
Which access control model can dynamically assign roles to subjects based on a set of defined rules?
Rule Based Access Control
When using Role Based Access Control (RBAC), permissions are assigned to:
Roles
A vulnerable process that is divided between two or more individuals to prevent fraudulent
application of the process is known as:
Separation of duties
A list that specifies which subjects are allowed to access an object and what operations they can
perform on it is referred to as a(n):
ACL
User accounts that remain active after an employee has left an organization are referred to as being
what type of accounts?
Orphaned
To assist with controlling orphaned and dormant accounts, what can be used to indicate when an
account is no longer active?
Account expiration
Although designed to support remote dial-in access to a corporate network, what service below is
commonly used with 802.1x port security for both wired and wireless LANs?
RADIUS
During RADIUS authentication, what type of packet includes information such as identification of a
specific AP that is sending the packet and the username and password?
authentication request
Select below the authentication system developed by the Massachusetts Institute of Technology
(MIT) to verify the identity of network users:
Kerberos
What authentication service commonly used on UNIX devices involves communicating user
authentication information to a centralized server?
TACACS
Entries within a Directory Information Base are arranged in a tree structure called the:
DIT
The X.500 standard defines a protocol for a client application to access an X.500 directory known as
which of the following options?
DAP
What kind of attack allows for the construction of LDAP statements based on user input statements,
which can then be used to access the LDAP database or modify the database’s information?
LDAP injection