Module 19 Access Control Flashcards

1
Q

What is the CIA triad?

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality?

A

Only authorized individuals, entities or processes can access sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is integrity

A

This refers to the production of data from unauthorized alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Authorized users must have uninterrupted access to the network resources and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the zero-trust approach

A

Never trust, always verify. This contains breaches, reduces risk of an attackers lateral movement throughout a network, and prevents unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a perimeter?

A

Any place where access control decisions are required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three pillars of trust?

A

Zero trust for the workforce, workloads and workplace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is zero trust for the workforce?

A

Only right users and secure devices can access applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is zero trust for the workloads

A

This is concerned with applications that are running in the cloud, in data centers, etc. Focuses on secure access when an API is accessing a database within an app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is zero trust for the workplace

A

This pillar focuses on secure access for all devices including IoT, that connect to enterprise networks - user endpoints, printers, virtual servers, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two access control models?

A

DAC, discretionary access control and mandatory access control (MAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is DAC

A

Discretionary access control, least restrictive, users control access to their data as owners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MAC

A

It assigns security levels to information and enables users with access based on security level clearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the newer models of Access Control?

A

RBAC, ABAC and TAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is RBAC

A

Role-based access control. Different roles, different permissions, more profile driven. Non-discretionary access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ABAC

A

Attribute based access control. Access based off of objects -

17
Q

What is TAC

A

Time based access control. Allows access to network resources based on time of day

18
Q

What is RBAC 2

A

Rule based access control. Network staff specifies set of rules that are associated with access to data or systems.

19
Q

What is AAA?

A

Network security policy. Specifies how administrators, corporate users, remote users access network resources. A network must be designed to control who is allowed to connect to it.

20
Q

What is authentication?

A

Authentication can be established using username and password

21
Q

What is authorization?

A

After user is authenticated, authorization service determines which resources user can access and which operations the user is allow to perform.

22
Q

What is accounting

A

Accounting records what the user does, what is accessed, amount of time, changes, resources, etc.

23
Q

What are the two Cisco common methods for implementing AAA services?

A

Local AAA Authentication

24
Q

What is local AAA Authenticaiton

A

Self-contained authentication, authenticates users against local stored usernames and passwords.

25
Q

What is server-based authentication?

A

Method authenticates a central AAA server that contains the usernames and passwords for all users. This is better for med-large networks. Example - a router authenticates the username and password using a AAA server like ISE.

26
Q

What is centralized AAA?

A

More scalable and manageable than local AAA. A centralized AAA system may independently maintain databases for auth, auth and accounting. It can also leverage AD and LDAP for user authen and group membership, while maintaining its own AAA databases,

27
Q

What is the diff between RADIUS AND TACACS+

A

TACACS+ separates auth, auth and acc. RADIUS does not, combines auth and author. RADIUS (UDP), TACACS+ (TCP), TACACS+ uses CHAP (bi-directional challenge).

28
Q

Name two more differences between TACACS+ and RADIUS?

A

TACACS+ encrypts entire body of the packet. RADIUS only encrypts the password in the access-request packet from the client to server. More shit is left open for RADIUS. NOT GOOD. But RADIUS does have more log functionality.

29
Q

What are some logging accounts?

A

Network accounting, EXEC accounting, system accounting, command accounting, resource accounting, etc

30
Q
A