Exam 9: Access Control Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.

(Multiple Choice)
4.8/5
(33)

Describe the Bell-LaPadula model.

(Essay)
4.7/5
(32)

List two of the most common types of authentication and AA servers.

(Essay)
4.7/5
(38)

A RADIUS ____________________ is a computer that forwards RADIUS messages among RADIUS clients and RADIUS servers.

(Short Answer)
4.7/5
(41)

The ____ model is the least restrictive.

(Multiple Choice)
4.8/5
(26)

A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources.

(True/False)
4.9/5
(43)

The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.

(Multiple Choice)
4.8/5
(38)

____ attacks may allow an attacker to construct LDAP statements based on user input statements.

(Multiple Choice)
4.9/5
(32)

Often ____________________ results from a single user being trusted with a set of responsibilities that place the person in complete control of the process.

(Short Answer)
4.8/5
(29)

____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.

(Multiple Choice)
4.8/5
(39)

The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server.

(True/False)
4.9/5
(43)

A user under Role Based Access Control can be assigned only one ____.

(Multiple Choice)
4.8/5
(32)

Describe the MAC lattice model.

(Essay)
4.8/5
(31)

____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.

(Multiple Choice)
4.7/5
(34)

List two major access control models.

(Essay)
4.8/5
(38)

TACACS+ and RADIUS are designed to support hundreds of remote connections.

(True/False)
4.8/5
(26)

A user accessing a computer system must present credentials or ____ when logging on to the system.

(Multiple Choice)
4.8/5
(34)

____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.

(Multiple Choice)
4.8/5
(35)

A shield icon warns users if they attempt to access any feature that requires UAC permission.

(True/False)
4.8/5
(31)

____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.

(Multiple Choice)
4.8/5
(28)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)