module 22 Flashcards

(49 cards)

1
Q

What does ACL stand for?

A

access control lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is access control lists?

A

How users receive rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access control or authorization models are generally classed as one of four things. Name them.

A
  1. DAC
  2. RBAC
  3. MAC
  4. Rule-based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does DAC stand for?

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does RBAC stand for?

A

Role-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does MAC stand for?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access control or authorization models are classified as one of the following (DAC, RBAC, MAC, or Rule-based).

Which is being described below?

This model adds an extra degree of administrative control to the DAC model. Under this model, a set of organization roles are defined and users allocated to those roles. You can see a simple version of this model working in the division of Windows user account types into Administrators and Standard Users.

A

RBAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access control or authorization models are classified as one of the following (DAC, RBAC, MAC, or Rule-based).

Which is being described below?

This model stresses the importance of the owner. The owner is originally the creator of the resource, though ownership can be assigned to another user. The owner is granted full control over the resource, meaning that they can modify its ACL to grant rights to others.

A

DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access control or authorization models are classified as one of the following (DAC, RBAC, MAC, or Rule-based).

Which is being described below?

This model can refer to any sort of access control model where access control policies are determined by system-enforced rules rather than system users.

A

Rule-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access control or authorization models are classified as one of the following (DAC, RBAC, MAC, or Rule-based).

Which is being described below?

This model is based on the idea of security clearance levels. Rather than defining access control lists on resources, each object and each subject is granted a clearance level, referred to as a label.

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is non-repudiation?

A

The principle that the user cannot deny having performed some action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name five mechanisms that can be used to provide non-repudiation.

A
  1. Logging
  2. Video
  3. Biometrics
  4. Signature
  5. Receipts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There are five mechanisms that can be used to provide non-repudiation. (logging, video, biometrics, signature, and receipts).

Which of the five is being described below?

Issuing this mechanism with respect to some product or service is proof that a user requested that product and that it was delivered in a timely manner.

A

Receipt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

There are five mechanisms that can be used to provide non-repudiation. (logging, video, biometrics, signature, and receipts).

Which of the five is being described below?

This mechanism can prove that the user was an author of a document (they cannot deny writing it).

A

Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There are five mechanisms that can be used to provide non-repudiation. (logging, video, biometrics, signature, and receipts).

Which of the five is being described below?

Strong authentication can probe that a person was genuinely operating their user account and that an intruder had not hijacked the account.

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

There are five mechanisms that can be used to provide non-repudiation. (logging, video, biometrics, signature, and receipts).

Which of the five is being described below?

Can record who goes in or out of a particular area.

A

Video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

User accounts can be assigned directly to security policies, but if there are a large number of users, this can be difficult to manage. How is this made simpler?

A

group accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Widows creates several default accounts. We’re only concerning ourselves with two. What are they?

A

administrative
standard user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Give three examples of a hardware token (“something you have”).

A

smart card
USB fob
SecureID token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does GPS stand for?

A

global positioning system

21
Q

What does IPS stand for?

A

Indoor Positioning System

22
Q

Authentication is the process of ensuring that each account is only operated by its proper user. There are many different authentication technologies. Name four

A
  1. something you know
  2. something you have
  3. something you are
  4. somewhere you are
23
Q

Give an example of something you know.

24
Q

Give an example of something you have.

A

authentication device

25
Give an example of something you are
biometrics
26
Give an example of somewhere you are
GPS authentication or IPS authentication
27
What does SSO stand for?
Single Sign-On
28
What is SSO (Single Sign-On)?
Something you only have to sign into once. An example would be when I sign into Microsoft outlook. I don't have to do it again, just once.
29
The following terminology is used to discuss cryptography: Name three.
Plain Text Cipher Text Cipher
30
What is plain text?
Unencrypted message.
31
What is cipher text?
An encrypted message.
32
What is Cipher?
The process used to encrypt or unencrypt a message.
33
What is symmetric encryption.
A single secret key is used to both encrypt and decrypt data.
34
Symmetric encryption is also referred to as __________ or ___________.
single-key private-key
35
What is the main problem and the main advantage of symmetric encryption.
secure distribution and storage of the key speed
36
What is the principal measure of the security of an encryption cipher?
the size of the key
37
What else might asymmetric encryption be called?
Public Key Cryptography
38
Asymmetric encryption uses a key to encrypt and a second key to decrypt data. What do you call each?
encrypt = public key decrypt = private key
39
A key pair can be used the other way around. If the private key is used to encrypt something, only the public key can then decrypt it. The point is that one type of key cannot reverse the operation it has just performed. There is no answer this is just a note.
40
What is the solution to the problem of authenticating subjects on public networks?
PKI
41
What does PKI stand for?
Public Key Infrastructure.
42
what does CA stand for
Certified Authority
43
What is a hash?
A short representation of data. It converts a variable amount of information and converts it to a fixed length string.
44
What does a cryptographic hash do?
1. A hash is only a portion of data. A cryptographic has allows for recovery of the remaining data. 2. It also ensures that no two pieces of information produces the same hash. 3. It can be used to prove that a message has not been tampered with.
45
What are the three most commonly used cryptographic hash algorithms?
SHA-1 SHA-2 MD5
46
What does SHA-1 stand for?
secure hash algorithm 1
47
What does MD5 stand for?
message digest 5
48
What does VPN stand for?
Virtual Private Network.
49
Password Best Practices
1. 9-12 characters in length 14 characters for administrative users. 2. No simple phrases or words. 3. Don't make it so complex that it has to be written down, or changed often. 4. Do not write down or share your password. 5. Change your password periodically. 6. Do not reuse passwords across different web accounts.