Exam 11: Access Control Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as:

(Multiple Choice)
4.8/5
(32)

To prevent one individual from having too much control, employees can ____________ job responsibilities within their home department or across positions in other departments.

(Short Answer)
4.8/5
(34)

Discuss the two significant weaknesses of DAC.

(Essay)
4.8/5
(32)

The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server.

(True/False)
4.9/5
(38)

A shield icon warns users if they attempt to access any feature that requires UAC permission.

(True/False)
4.8/5
(30)

List two of the most common types of authentication and AA servers.

(Essay)
4.8/5
(34)

List two major access control models.

(Essay)
4.7/5
(31)

The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following options?

(Multiple Choice)
4.9/5
(36)

What authentication service commonly used on UNIX devices involves communicating user authentication information to a centralized server?

(Multiple Choice)
4.8/5
(37)

The capability to look up information by name under the X.500 standard is known as a(n) ____________________-pages service.

(Short Answer)
4.7/5
(33)

Describe LDAP injection attacks.

(Essay)
4.9/5
(44)

Authorization and access are viewed as synonymous and in access control, they are the same step.

(True/False)
4.9/5
(31)

What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?

(Multiple Choice)
4.9/5
(35)

Matching -The act of moving individuals from one job responsibility to another.​

(Multiple Choice)
4.9/5
(36)

Describe the Bell-LaPadula model.

(Essay)
4.9/5
(42)

What access control model below is considered to be the most restrictive access control model, and involves assigning access controls to users strictly according to the custodian?

(Multiple Choice)
4.7/5
(39)

Matching -The second version of the Terminal Access Control Access Control System (TACACS) authentication service.​

(Multiple Choice)
4.8/5
(40)

Matching -The least restrictive access control model in which the owner of the object has total control over it.​

(Multiple Choice)
4.9/5
(32)

Matching -​The process of setting a user's account to expire

(Multiple Choice)
4.9/5
(33)

Discuss the differences between DAP and LDAP.

(Essay)
4.8/5
(35)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)