Flashcards in IS3230 CHAPTER 10 Deck (41):
An element of the access control list known as (ACE) is called ___.
ACCESS CONTROL ENTRY (ACE)
A list of security policies that is associated with an object is called ___.
ACCESS CONTROL LIST (ACL)
Someone trying to compromise information or data is called ___.
The service provided through Kerberos that identifies users on a computer system and is part of the Key Distribution Center is called ___.
A message that is part of the Kerberos authentication process and is composed of the client ID and timestamp is called ___.
A model that defines basic principles of access controls is called ___.
Information that has cryptographic protection applied to it is called ___.
Products that are easily available to anyone is called ___.
COMMERCIAL OFF-THE-SHELF (COTS)
ISO/IEC 15408 standard for computer security is called ___.
.Unauthorized access and release of information is called ___.
Used to control access to resources this is called ___.
Used to protect data so that it cannot be easily read or understood is called ___.
An attack against a system that limits it from doing the tasks it is intended to do is called ___.
DENIAL OF SERVICE (DoS) ATTACK
Provides a means of verifying identities of computer systems on an unprotected network. This is designed to provide strong authentication for client/server applications by using secret-key cryptography is called ___.
The service or server that acts as both the ticket granting service and the authentication service is called ___.
KEY DISTRIBUTION CENTER (KDC)
The use of policies within a network infrastructure to limit access to resources until the system proves that it has complied with the policy is called ___.
NETWORK ACCESS CONTROL (NAC)
This divides the network infrastructure into seven layers and is called ___.
OPEN SYSTEMS INTERCONNECTION (OSI) REFERENCE MODEL
This is orange and part of the "Rainbow Series" published by the US DOD is called ___.
A key used to encrypt and decrypt messages is called ___.
A variable that identifies a user, group, or account is called ___.
SECURITY IDENTIFIER (SID)
An access point's ID on a wireless LAN is called ___.
SERVICE SET IDENTIFIER (SSID)
.A method of access control that allows a user to log on to a system and gain access to other resources within the network via the initial logon. It helps a user avoid having to log on multiple times and remember multiple passwords for various systems is called ___.
SINGLE SIGN-ON (SSO)
The act of identifying a suer as authentic with a single authentication factor is called ___.
A form of encryption where the sender and the receiver use the same key for encrypting an object is called ___.
Encryption used for WLANs is called ___.
TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)
The act of identifying a suer as authentic with three authentication factors is called ___.
A server or service that is authorized to issue tickets to the client after the client has already received a ticket granting ticket and is called ___.
TICKET-GRANTING SERVICE (TGS)
Being open and honest about the infrastructure; not hiding any data from the users is called ___.
The act of identifying a user as authentic with two authentication factors is called ___.
1. What does ACL stand for?
1. Access control level
2. Access control limit
3. Access control logic
4.Access control list
Access control list
2. List the four types of access control models.
MANDATORY access control (MAC)
DISCRETIONARY access control (DAC)
ROLE BASED access control (RBAC)
ATTRIBUTE-BASED access control (ABAC)
3. Which of the following are components of a Kerberos system? (Select two)
4. A switch is a divide used on which layer of the OSI model?
1. Layer 1
2. Layer 2
3. Layer 4
4. Layer 5
5. Which of the following are authentication factors? (Select three)
1, Something you need
2, Something you have
3, Something you are
4, Something you believe
5, Something you know
Something you have
Something you are
Something you know
6. VLANs are used to segment networks.
TRUE OR FALSE
7. What are types of access control lists?
8. Passwords should have no time limit assigned to them.
TRUE OR FALSE
9. Which of the following is the most secure encryption method for WLANs?
10. How many hexadecimal digits are provided by IEEE for vendor identification?
11. Which IEEE standard defines WLANs?