Module 13 - Access Control Flashcards
(126 cards)
Which type of control prevents direct contact with systems by using physical barriers like doors, guards, and fences?
Physical Access Control
Which type of access control includes policies, procedures, and personnel-based practices?
Administrative access control
Which category of access control includes encryption, smart cards, and firewalls?
Logical access control
Which type of control determines who can enter or exit a facility, when, and where?
Physical access control
Which system uses a sequence of locked doors to trap and screen individuals entering a secure area?
A mantrap
Which list defines allowed or denied traffic on a network based on rules?
CLs (Access Control Lists)
Which method converts readable data into unreadable form to protect confidentiality?
Encryption
Which mechanism sets error thresholds, triggering a warning when exceeded?
A clipping level
Which type of statement expresses the intent behind an organization’s security decisions?
Policies
Which practice involves organizing data based on levels of confidentiality or impact?
Data classification
Which set of rules governs how data is exchanged between devices?
Protocols
Which document provides detailed, step-by-step instructions to perform a specific task?
Procedures
Which AAA function confirms a user’s identity before access is granted?
Authentication
Which AAA function determines what resources a verified user can access and what actions they can perform?
Authorization
Which is the most common method used to identify a user in an access control system?
Username
Which model allows users from different enterprises to use the same credentials to access multiple networks?
FIM (Federated Identity Management)
Which AAA function logs and monitors user actions, access duration, and system changes?
Accounting
Which security concept involves tracing an action back to a person or process and reporting the usage data?
Accountability
Which process enforces the rules of the authorization policy by ensuring only recognized users can perform allowed actions?
Identification
Which password characteristics are recommended for security? (4)
At least 8 characters, mix of uppercase and lowercase letters, special characters, numbers
Which identity system links a user’s electronic identity across different identity management domains?
FIM (Federated Identity Management)
What do we call a cyberattack where the initial compromise of one system leads to the compromise of other interconnected systems, creating a chain reaction of failures?
A cascading attack
What is the primary risk associated with federated identity management across multiple enterprises?
Increased vulnerability to cascading attacks
Which small device typically used in 2FA displays a temporary number after inputting a PIN or card?
A security key fob