Midterm Prep Flashcards
(108 cards)
Which Type of control is based on the identity of the requestor and the access rules state what a requestor can or cannot do?
Discretionary access control (DAC).
This policy is termed discretionary because an entity might have access rights that permit the entity, by its own volition, to enable another entity to access some resource.
Source: Book Chapter 4.2 Page 131
What data structure is typically used to implement DAC?
A 2-dimensional matrix.
Source: Book Chapter 4.3 Page 111
Access Control Lists make it easy to look up who all the users are that can access a resource, and the type of access they have for that resource.
True or False?
True
Source: Book Chapter 4.3 Page 111
What does each entry of an access matrix indicate?
Access rights of a particular subject for a particular object.
Source: Book pg. 111
(True/False) DAC is a concept that evolved out of requirements for military information security.
False, DAC is the traditional method for implementing access control, MAC was created out of military necessity.
Source: Book, Ch 4, Pg. 109
(True/False) One problem with DAC is that it is not possible to control information flow.
True
Source: Mandatory Access Control Lecture
(True/False) DAC is popular with corporations because it reflects how they treat their data.
False. Employers mandate explicit policies on who can share what.
Source: Mandatory Access Control Lecture
Put the following statements, regarding the sequence of calls made made by a function call to the stack, in the correct order:
A. Allocate space for local variables by moving the stack pointer down to leave sufficient room for them.
B. Push the parameters for the called function onto the stack.
C. Run the body of the called function.
D. Execute the return function which pops the saved address off the stack and returns control to the calling function.
E. Push the current frame pointer value (which points to the calling routine’s stack frame) onto the stack.
F. Executes the call instruction to call the target function, which pushes the return address onto the stack.
G. Pops the old frame pointer value (restoring the link to the calling routine’s stack frame).
H. Sets the frame pointer to be the current stack pointer value, which now identifies the new stack frame location for the called function.
I. Set the stack pointer back to the value of the frame pointer.
B, F, E, H, A, C, I, G, D
From text pg 327.
An access control mechanism mediates between a user (or a process executing on behalf of a user) and system resources, such as:
a) firewalls
b) routers
c) applications
d) a & b only
f) All of the above
f) All of the above
Textbook, Chapter 4, pg. 108
Which of the following is granting permission to a system entity to access a system resource?
A) Authentication B) Authorization C) Audit D) Allowance E) None of the Above
B, Authorization determines who is trusted for a given purpose Source: Book
Chapter 4.1 Page 130
Access control implements a security policy that verifies the credentials of a user. True or false?
False. Access control implements a security policy that specifies who or what may have access to each specific system resource, and the type of access that is permitted in each instance.
Source: Book pg. 107
Under Mandatory Access Control(MAC), what two properties provide confidentiality:
- No read up: A subject can only read an object of less or equal security level 2. No write down: A subject can only write into an object of greater or equal security level.
Source: Book Chapter 27 Page 27-4
A subject is said to have a security clearance of a given level and an object is said to have a security classification of a given level. True or False?
True
Source: Book Chapter 27 Page 27-4
For the Bell-Lapadula Model (BLP), the properties needed for the confidentiality form of MAC are:
- ds-property and *-property
- ss-property and *-property
- ss-property and ds-property
- None of the above
(Chapter 27.1)
ss-property (simple security property: no read up *-property (star property): no write down
The ds-property is a provision made by BLP for DAC but must be consistent with MAC rules.
Other MAC models such as Bell and La Padua (BLP Model) is focused on Integrity, and BIBA model is focused on Confidentiality. True or false?
False. BLP focuses on Confidentiality and BIBA focuses on Integrity.
Source: P1:L6 MAC slides | Other MAC models
Examples of BLP model classfications are High, Medium, and Low. True or false?
False. Examples are Top Secret, Secret, Confidential.
Source: P1:L6 MAC slides | Other MAC models
MAC cannot be employed with other access control policies, such as DAC, RBAC, and ABAC. True or false?
False. All four access policies (DAC, MAC, RBAC, and ABAC) are not mutually exclusive.
Source: Book, Ch. 4, Pg. 109
In the context of Role-Based Access Control Models, What does RBAC2 provide?
Constraints, mutually exclusive roles, Cardinality
Source: Book Pages 147-148
__ is based on the roles that users assume in a system rather than a user’s identity.
A. DAC
B. MAC
C. RBAC
D. ABAC
C
Source: Book pg. 120
What kind of relationship is a role to a user in RBAC?
A) 1 to 1
B) 1 to Many
C) Many to 1
D) Many to Many
D, a role can have many users. a user can have many roles.
Source: Book Chapter 4.5 Page 146
What aspect of an established RBAC system is likely to change infrequently?
A) The set of resources and the specific access rights associated with a particular role. B) The set of roles in the system. C) The set of users. D) A & B E) None of the above.
D
Source: Book. Ch 4, Pg 120
The RBAC prerequisite role can be used for the following:
A) A way to increase the difficulty of collusion among individuals of different skills or divergent job functions to thwart security policies.
B) For structuring the implementation of the least privilege concept.
C) As a risk mitigation technique for a sensitive or powerful permission.
D) None of the above
B.
Source: Book, Ch 4, Pg 125
Question: What are the 3 attributes of ABAC model?
a) Subject - active entity: user, application, process, device
b) Object - passive entity: file, record, network, domain
c) Environment: date/time, virus activity, network’s security level
Source: book p. 127 https://www.proprofs.com/quiz-school/story.php?title=mr-f-quiz-network
Question: How does ABAC model controls access?
ABAC evaluates attributes of subject/object and access control rule defining allowable operation in a given environment
Source: book p. 127