IS3230 CHAPTER 10 Flashcards
An element of the access control list known as (ACE) is called ___.
ACCESS CONTROL ENTRY (ACE)
A list of security policies that is associated with an object is called ___.
ACCESS CONTROL LIST (ACL)
Someone trying to compromise information or data is called ___.
ATTACKER
The service provided through Kerberos that identifies users on a computer system and is part of the Key Distribution Center is called ___.
AUTHENTICATION SERVICE
A message that is part of the Kerberos authentication process and is composed of the client ID and timestamp is called ___.
AUTHENTICATOR
A model that defines basic principles of access controls is called ___.
BELL-LaPADULA MODEL
Information that has cryptographic protection applied to it is called ___.
CLEAR TEXT
Products that are easily available to anyone is called ___.
COMMERCIAL OFF-THE-SHELF (COTS)
ISO/IEC 15408 standard for computer security is called ___.
COMMON CRITERIA
.Unauthorized access and release of information is called ___.
COMPROMISE
Used to control access to resources this is called ___.
CREDENTIALS
Used to protect data so that it cannot be easily read or understood is called ___.
CRYPTOGRAPHY
An attack against a system that limits it from doing the tasks it is intended to do is called ___.
DENIAL OF SERVICE (DoS) ATTACK
Provides a means of verifying identities of computer systems on an unprotected network. This is designed to provide strong authentication for client/server applications by using secret-key cryptography is called ___.
KERBEROS
The service or server that acts as both the ticket granting service and the authentication service is called ___.
KEY DISTRIBUTION CENTER (KDC)
The use of policies within a network infrastructure to limit access to resources until the system proves that it has complied with the policy is called ___.
NETWORK ACCESS CONTROL (NAC)
This divides the network infrastructure into seven layers and is called ___.
OPEN SYSTEMS INTERCONNECTION (OSI) REFERENCE MODEL
This is orange and part of the “Rainbow Series” published by the US DOD is called ___.
ORANGE BOOK
A key used to encrypt and decrypt messages is called ___.
SECRET KEY
A variable that identifies a user, group, or account is called ___.
SECURITY IDENTIFIER (SID)
An access point’s ID on a wireless LAN is called ___.
SERVICE SET IDENTIFIER (SSID)
.A method of access control that allows a user to log on to a system and gain access to other resources within the network via the initial logon. It helps a user avoid having to log on multiple times and remember multiple passwords for various systems is called ___.
SINGLE SIGN-ON (SSO)
The act of identifying a suer as authentic with a single authentication factor is called ___.
SINGLE-FACTOR AUTHENTICATION
A form of encryption where the sender and the receiver use the same key for encrypting an object is called ___.
SYMMETRIC ENCRYPTION