Question Set 4 Flashcards
Who is responsible for establishing access permissions to network resources in the DAC access control model? A. The system administrator B. The owner of the resource C. The system administrator and the owner of the resource D. The user requiring access to the resource
B. The owner of the resource
Which access control system allows the system administrator to establish access permissions to network resources? A. MAC B. DAC C. RBAC D. None of the above
A. MAC
Which of the following access control models uses roles to determine access permissions? A. MAC B. DAC C. RBAC D. None of the above
C. RBAC
How is access control permissions established in the RBAC access control model? A. The system administrator B. The owner of the resource C. The roles or responsibilities users have in the organization D. None of the above
C. The roles or responsibilities users have in the organization
What does the DAC access control model use to identify the users who have permissions to a resource? A. Predefined access privileges B. The role or responsibilities users have in the organization C. Access Control Lists D. None of the above
C. ACLs
What does the MAC access control model use to identify the users who have permissions to a resource? A. Perdefined access privileges B. The role or responsibilities users have in the organization C. Access Control Lists D. None of the above
A. Predefined access privileges
Which of the following statements regarding the MAC access control models is TRUE? A. The Mandatory Access Control (MAC) model is a dynamic model. B. In the Mandatory Access Control (MAC) the owner of a resource establishes access privileges to that resource. C. In the Mandatory Access Control (MAC) users cannot share resources dynamically. D. The Mandatory Access Control (MAC) model is not restrictive.
C. In the Mandatory Access Control (MAC) users cannot share resources dynamically
Which of the following are types of certificate-based authentication? (SELECT TWO) A. Many-to-one mapping B. One-to-one mapping C. One-to-many mapping D. Many-to-many mapping
A. Many-to-one mapping B. One-to-one mapping
The ability to logon to multiple systems with the same credentials is typically known as: A. decentralized management B. single sign-on C. Role Based Access Control (RBAC) D. centralized management
B. single sign-on
Remote authentication allows you to authenticate Zendesk users using a locally hosted script. Which of the following is an example of remote authentication? A. A user on a metropolitan are network (MAN) accesses a host by entering a username and password pair while not connected to the LAN. B. A user on a campus are network (CAN) connects to a server in another building and enters a username and password pair. C. A user in one building logs on to the network by entering a username and password into a host in the same building. D. A user in one city logs onto a netwrok by connecting to a domain server in another city.
D. A user in one city logs onto a network by connecting to a domain server in another city.
The DAC (Discretionary Access Control) model has an inherent flaw. Choose the option that describes this flaw. A. The DAC (Discretionary Access Control) model uses only the identity of the user or sspecific process to control access to a resource. This creates a security loophole for Trojan horse attacks. B. The DAC (Discretionary Access Control) model uses certificates to control access to resources. This creates an opportunity for attackers to use your certificates. C. The DAC (Discretionary Access Control) model does not use the identity of a user to control access to resources. This allows anyone to use an account to access resources. D. The DAC (Discretionary Access Control) model does not have any known security flaws.
A. The DAC (Discretionary Access Control) model uses only the identity of the user or sspecific process to control access to a resource. This creates a security loophole for Trojan horse attacks.
You work as the network administrator for ABZ.com. The ABZ.com network uses the RBAC (Role Based Access Control) model. You must plan the security strategy for users to access resources on the ABZ.com network. The types of resources you must control access to our mailboxes and files and printers. ABZ.com is divided into distinct departments and functions named Finance Sales Research and Development and Production respectively. Each user has its own workstation and accesses resources based on the department wherein he/she works. You must determine which roles to create to support the RBAC (Role Based Access Control) model. Which of the following roles should you create? A. Create mailbox and file and printer roles. B. Create Finance Sales Research and Development and Production roles. C. Create user and workstation roles. D. Create allow access and deny access roles.
B. Create Finance Sales Research and Development and Production roles.
Choose the access control model that allows access control determinations to be performed based on the security labels associated with each user and each data item. A. MACs (Mandatory Access Control) method B. RBACs (Role Based Access Control) method C. LBACs (List Based Access Control) method D. DACs (Discretionary Access Control) method
A. MACs (Mandatory Access Control) method
Choose the terminology or concept which best describes a (Mandatory Access Control) model. A. Lattice B. Bell La-Padula C. BIBA D. Clark and Wilson
A. Lattice
Which authentiation method does the following sequence: Logon request encrypts value response server challenge compare encrypts results authorize or fail refer to? A. Certificates B. Security Tokens C. CHAP D. Kerberos
C. CHAP
Which of the following types of publicly accessible servers should have anonymous logins disabled to prevent an attacker from transferring malicious data? A. FTP B. Email C. Web D. DNS
A. FTP
Which of the following will restrict access to files according to the identity of the user or group? A. MAC B. CRL C. PKI D. DAC
D. DAC
Which of the following network authentication protocols uses symmetric key cryptography stores a shared key for each network resource and uses a Key Distrobution Center (KDC)? A. RADIUS B. TACACS+ C. Kerberos D. PKI
C. Kerberos
Which of the following access control models uses subject and object labels? A. Mandatory Access Control (MAC) B. Role Based Access Control (RBAC) C. Rule Based Access Control (RBAC) D. Discretionary Access Control (DAC)
A. Mandatory Access Control (MAC)
Which of the following access decisions are based on a Mandatory Access Control (MAC) environment? A. Access control lists B. Ownership C. Group membership D. Sensitivity labels
D. Sensitivity labels
Which of the following types of authentication BEST describes providing a username password and undergoing a thumb print scan to access a workstation? A. Multifactor B. Mutual C. Biometric D. Kerberos
A. Multifactor
Users would not like to enter credentials to each server or application to conduct their normal work. Which type of stategy can solve this problem? A. Biometrics B. Smart card C. Two-factor authentication D. SSO
D. SSO
Kerberos uses which of the following ports by default? A. 23 B. 88 C. 139 D. 443
B. 88
Which of the following authentication systems make use of the KDC Key Distribution Center? A. Certificates B. Security Tokens C. CHAP D. Kerberos
D. Kerberos