Exam 11: Access Control Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Select below the authentication system developed by the Massachusetts Institute of Technology (MIT) to verify the identity of network users:

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

B

Matching -The current version of the Terminal Access Control Access Control System (TACACS) authentication service.​

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

I

Matching -​Limitation imposed as to when a user can log in to a system or access resources.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

J

Group policy is a Unix feature that allows for the centralized management and configuration of computers and remote users using Unix Active Directory.

(True/False)
4.8/5
(34)

In the DAC model, ____________________ can create and access their objects freely.

(Short Answer)
4.8/5
(43)

Entries within a Directory Information Base are arranged in a tree structure called the:

(Multiple Choice)
4.8/5
(33)

____________________ is granting or denying approval to use specific resources. ​ a.​Account expiration b.Discretionary access control (DAC)​ c.​Extended TACACS (XTACACS) d.Job rotation​ e.​LDAP injection attack

(Short Answer)
4.8/5
(26)

Describe the two key elements of the MAC model.

(Essay)
4.9/5
(31)

The Bell-LaPadula (BLP) model of MAC can be used to prevent subjects from creating a new object or performing specific functions on objects that are at a lower level than their own.​

(True/False)
4.8/5
(41)

Which access control model can dynamically assign roles to subjects based on a set of defined rules?

(Multiple Choice)
4.9/5
(34)

When using Role Based Access Control (RBAC), permissions are assigned to:

(Multiple Choice)
4.9/5
(28)

Select below the access control model that uses access based on a user's job function within an organization:

(Multiple Choice)
5.0/5
(39)

User accounts that remain active after an employee has left an organization are referred to as being what type of accounts?

(Multiple Choice)
4.7/5
(29)

What is the name for a predefined framework that can be used for controlling access, and is embedded into software and hardware?

(Multiple Choice)
4.8/5
(31)

Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?

(Multiple Choice)
4.9/5
(37)

A user or a process functioning on behalf of the user that attempts to access an object is known as the:

(Multiple Choice)
4.9/5
(36)

Matching -An attack that constructs LDAP statements based on user input statements, allowing the attacker to retrieve information from the LDAP database or modify its content.​

(Multiple Choice)
4.9/5
(35)

List the steps for RADIUS authentication with a wireless device in an IEEE 802.1x network.

(Essay)
4.8/5
(34)

Describe how Kerberos works.

(Essay)
4.9/5
(38)

Matching -Providing only the minimum amount of privileges necessary to perform a job or function.​

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)