Exam 3: Authenticating Users

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Describe mandatory access control.

Free
(Essay)
4.8/5
(41)
Correct Answer:
Verified

Mandatory Access Control (MAC) is a requirement in some settings.When used, it is structured and coordinated with both a data classification scheme and a personnel clearance scheme.Users and data owners have little or no control over access to the information resources being controlled by the MAC environment.A MAC will use a data classification scheme that assigns each collection or type of information to a sensitivity level.Each user is also rated with a sensitivity level called a clearance that will specify the level of information he or she may access.

RADIUS works with Network Address Translation (NAT).

Free
(True/False)
4.8/5
(39)
Correct Answer:
Verified

False

____ reduces the chance of an individual violating information security by increasing the scrutiny on any one user.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

What are the general steps a firewall uses to authenticate users?

(Essay)
4.7/5
(31)

What are the functions that can be used to classify access controls?

(Essay)
4.7/5
(44)

Match each item with a statement below. -Determined by a central authority in the organization.

(Multiple Choice)
4.9/5
(37)

Physical attributes are an example of something you ____ that can be used to verify identity.

(Multiple Choice)
4.9/5
(43)

Match each item with a statement below. -Confirming the identity of the entity seeking access to a logical or physical area

(Multiple Choice)
4.8/5
(39)

Match each item with a statement below. -Obtaining the identity of the entity requesting access to a logical or physical area.

(Multiple Choice)
4.8/5
(41)

You might have to use TACACS+ or ____ if your firewall doesn't support authentication.

(Multiple Choice)
4.9/5
(29)

____________________ IP address mappings work best because some TACACS+ systems use the source IP address to create the encryption key.

(Short Answer)
4.7/5
(45)

____ authentication can enable employees who work remotely or who are traveling to access your internal servers.

(Multiple Choice)
4.8/5
(26)

Match each item with a statement below. -Principle by which employees are provided access to the minimal amount of information for the least duration of time necessary to perform their duties

(Multiple Choice)
4.9/5
(34)

The ____ authentication server is also known as a Key Distribution Center (KDC).

(Multiple Choice)
4.7/5
(30)

____ access controls remedy a circumstance or mitigate the damage caused during an incident.

(Multiple Choice)
4.8/5
(39)

Client authentication or ____ authentication should be used when only a single user is coming from a single IP address.

(Multiple Choice)
4.9/5
(28)

____ is most frequently associated with data classification schemes.

(Multiple Choice)
4.8/5
(21)

What are discretionary access controls?

(Essay)
4.9/5
(30)

In ____________________-based access controls, access is granted based on a set of rules specified by the central authority.

(Short Answer)
4.8/5
(31)

Match each item with a statement below. -Documenting the activities of the authorized individual and systems.

(Multiple Choice)
4.7/5
(35)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)