Domain 5.0 Access Control and Identity Management Flashcards

0
Q

What element of a Kerberos ticket makes it secure against re-use?

A. It requires the subject to claim an identity
B. Multiple KDCs can exist on the same network
C. A timestamp is added before being sent to the user
D. It is based on the hash of the password

A

C. A timestamp is added before being sent to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Which of the following is not one of the three features or services commonly referred to as AAA provided by TACACS?

A. Authentication
B. Availability
C. Authorization
D. Auditing

A

B. Availability

AAA - Authentication, Authorization, Accounting
TACACS - Terminal Access Controller Access Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

LDAP’s naming and organizational scheme is based on what standard?

A. X.500
B. 802.11x
C. RFC 1918
D. RBAC

A

A. X.500

LDAP - Lightweight Directory Access Protocol
RFC - Request For Comments (??)
RBAC - Role Based Access Control and Rules Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the default service port of RADIUS?

A. UDP 1812
B. TCP 1812
C. UDP 49
D. TCP 49

A

A. UDP 1812

RADIUS - Remote Authentication Dial-In User Server
TACACS is TCP 49

(TCP 1812 and UDP 49 are unused)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following was a Cisco proprietary variation of the original RFC 1492 technology, and was later replaced by a non-compatible “plus” version?

A. RADIUS
B. TEMPEST
C. DIAMETER
D. XTACACS

A

D. XTACACS

RADIUS - Remote Authentication Dial-In Server
TACACS - Terminal Access Controller Access Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is true?

A. Identification can only be something you know
B. Authentication cannot be a single factor
C. A single factor can be used securely for both authentication and identification simultaneously
D. An authentication factor verifies a claimed identity

A

D. An authentication factor verifies a claimed identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is it known as when a password, a fingerprint scan, and a swipe of a smart card are used in order to log into a workstation?

A. Kerberos authentication
B. multifactor authentication
C. Domain authentication
D. mutual authentication

A

B. multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an example of a smart card?

A. Debit card
B. USB thumb drive
C. Common access card
D. Biometric scanner

A

C. Common access card

CAC - Common Access Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example of an implementation of Linux considered to be a Trusted OS?

A. Nessus
B. Mandriva
C. SE Linux
D. VLOS

A

C. SE Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an additional requirement needed to gain access to sensitive resources that is commonly used in hierarchical environments known as?

A. Role based access
B. Rule based access
C. Metered access
D. Need to know access

A

D. Need to know access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When single sign-on is used, what mechanism of controlling privileges on resources is needed?

A. Token based systems
B. Time based tickets
C. Certificate based ACLs
D. Any standard mechanism of authorization

A

D. Any standard mechanism of authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the most secure method to store a certificate used for identification purposes?

A. Windows 7’s registry
B. Hidden directory off of the root directory
C. Smart card
D. Text file in home folder

A

C. Smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the security mechanism that divides all sensitive tasks into groupings and assigns each grouping to a unique subject commonly known as?

A. Need to know
B. Separation of duties
C. Job rotation
D. Collusion protection

A

B. Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the policy of granting users only sufficient access to accomplish assigned work tasks known as?

A. Principle of least privilege
B. Single sign-on
C. Implicit deny
D. Job rotation

A

A. Principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a person is assigned administrative duties as part of their overall responsibilities, which of the following should be true?

A. The person is given the root account credentials
B. The person is given access to use the shared administrator account
C. The person is given two accounts, one standard and one administrative
D. The person is issued a temporary account

A

C. The person is given two accounts, one standard and one administrative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following events is not a symptom of a user’s account credentials being guessed?

A. Several repeated failed logon attempts
B. Contacting technical support to re-enable a disabled account
C. A successful logon attempt
D. Triggering of an account lockout

A

B. Contacting technical support to re-enable a disabled account

16
Q

Which of the following improves the security of a password significantly?

A. Length
B. Use of uppercase and lowercase letters
C. Setting a minimum age
D. Using a keystroke pattern

A

A. Length

17
Q

In a DAC environment, when a user has numerous group members, each providing some form of exception to the implicit deny over various objects, how are the effective permissions ultimately derived?

A. Checking classification labels
B. Building an access control matrix
C. Accumulation of grants, minus any denials
D. Requesting two or more factors

A

C. Accumulation of grants, minus any denials

18
Q

Name some the Technical Controls

A

Least Privilege
Antivirus Software
Intrusion Detection Systems (IDSs)
Firewalls

19
Q

Name some Management Controls

A

Risk assessments

Vulnerability assessments

20
Q

Name the Operational Controls

A
Awareness and training
Configuration management
Contingency planning
Media protection
Physical and environmental protection
21
Q

Name some Preventative Controls

A

Security guards
Change management
Account disablement policy
System Hardening

22
Q

Name some Detective Controls

A

Security Audits

Video surveillance

23
Q

Name some Corrective Controls

A

Active IDS (detects attacks and modifies the environment to prevent the attack from continuing)

Backup and system recovery

24
Q

Name some examples of RULE Based Access Control

A

Routers
Firewalls

They use Access Control Lists as a set of rules to define what traffic is allowed or blocked.