Chapter 6 Flashcards
(94 cards)
A remote access user needs to gain access to resources on the server. Which of the following processes are performed by the remote access server to control access to resources?
Authentication and accounting
Authentication and authorization
Authorization and accounting
Identity proofing and authorization
Identity proofing and authentication
Authentication and authorization
Audit trails produced by auditing activities are which type of security control?
Detective
Directive
Preventative
Deterrent
Detective
Which of the following is used for identification?
Password
PIN
Username
Cognitive question
Username
You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with?
Principle of least privilege
Cross-training
Need to know
Job rotation
Principle of least privilege
You want to implement an access control list in which only the users you specifically authorize have access to the resource. Anyone not on the list should be prevented from having access.
Which of the following methods of access control should the access list use?
Implicit allow, explicit deny
Explicit allow, implicit deny
Implicit allow, implicit deny
Explicit allow, explicit deny
Explicit allow, implicit deny
Which of the following principles is implemented in a mandatory access control model to determine object access by classification level?
Principle of least privilege
Need to Know
Separation of duties
Ownership
Clearance
Need to Know
Which of the following is an example of privilege escalation?
Separation of duties
Principle of least privilege
Privilege creep
Mandatory vacations
Privilege creep
What is the primary purpose of separation of duties?
Inform managers that they are not trusted
Grant a greater range of control to senior management
Prevent conflicts of interest
Increase the difficulty of performing administrative duties
Prevent conflicts of interest
Which access control model is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject?
Rule-Based Access Control
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Mandatory Access Control (MAC)
Attribute-Based Access Control (ABAC)
You have implemented an access control method that only allows users who are managers to access specific data. Which type of access control model is being used?
RBAC
MAC
DACL
DAC
RBAC
Which of the following is an example of rule-based access control?
A member of the accounting team that is given access to the accounting department documents.
A computer file owner who grants access to the file by adding other users to an access control list.
A subject with a government clearance that allows access to government classification labels of Confidential, Secret, and Top Secret.
Router access control lists that allow or deny traffic based on the characteristics of an IP packet.
Router access control lists that allow or deny traffic based on the characteristics of an IP packet.
Which of the following are examples of Something You Have authentication controls? (Select two.)
Voice recognition
Smart card
Handwriting analysis
Photo ID
PIN
Cognitive question
Smart card
Photo ID
Which of the following identification and authentication factors are often well known or easily discovered by others on the same network or system?
PGP secret key
Password
Username
Biometric reference profile
Username
Which of the following is a password that relates to things that people know, such as a mother’s maiden name or a pet’s name?
Dynamic
One-time
Passphrase
Cognitive
Cognitive
What type of password is maryhadalittlelamb?
Static
Passphrase
Composition
Cognitive
Passphrase
smart card can be used to store all but which of the following items?
Digital signature
Identification codes
Biometric template original
Cryptography keys
Biometric template original
Which of the following are disadvantages of biometrics? (Select two.)
Biometric factors for identical twins are the same.
When used alone, they are no more secure than a strong password.
They can be circumvented using a brute force attack.
They require time synchronization.
They have the potential to produce numerous false negatives.
When used alone, they are no more secure than a strong password.
They have the potential to produce numerous false negatives.
What is the MOST important aspect of a biometric device?
Accuracy
Size of the reference profile
Enrollment time
Throughput
Accuracy
Which of the following defines the crossover error rate for evaluating biometric systems?
The point where the number of false positives matches the number of false negatives in a biometric system.
The number of subjects or authentication attempts that can be validated.
The rate of people who are given access when they should be denied access.
The rate of people who are denied access when they should be allowed access.
The point where the number of false positives matches the number of false negatives in a biometric system.
Which of the following terms is used to describe an event in which a person who should be allowed access is denied access to a system?
False positive
False acceptance
False negative
Error rate
False negative
Which security mechanism uses a unique list that meets the following specifications:
The list is embedded directly in the object itself.
The list defines which subjects have access to certain objects.
The list specifies the level or type of access allowed to certain objects.
Mandatory access control
Hashing
User ACL
Conditional access
User ACL
What is the process of controlling access to resources such as computers, files, or printers called?
Mandatory access control
Conditional access
Authorization
Authentication
Authorization
Which of the following objects identifies a set of users with similar access needs?
SACL
Permissions
Group
DACL
Group
Which of the following identifies the type of access that is allowed or denied for an object?
DACL
SACL
Permissions
User rights
Permissions