Deck 5: ID and Access

Full screen (f)
exit full mode
Question
What category is involved with access control layers?

A)Administrative Controls
B)Physical Controls
C)Technical Controls
D)All of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Access control layers consist of administrative controls, physical controls, and technical controls that work at different levels of what?

A)Within their own categories
B)Within each control group
C)Both A and B
D)Neither A nor B
Question
What is based on the sensitivity of data and knows what actions should be allowed?

A)Database reviews
B)Cell Suppression
C)Content-dependent access control
D)Polyinstantiation
Question
What could a company do to prevent an employee from accessing a higher level of access by preventing them from even knowing it exists?

A)Database reviews
B)Cell Suppression
C)Content-Dependent Access Control
D)Polyinstantiation
Question
What is defined as a set of objects that a subject is able to access?

A)Combined Mode
B)Virtual Memory
C)Salvaged Memory
D)Domain
Question
Jeffery is signing in to his network station and is being challenged by a random value called a nonce. Why type of device is this?

A)Traffic Anomaly-based IDS
B)Asynchronous Token
C)Network-based Detection
D)Host-based Detection
Question
What type of access control synchronizes with the authentication service by using time or a count as the core piece of the authentication process?

A)Traffic Anomaly-based IDS
B)Asynchronous Token
C)Synchronous Token Device
D)Cryptographic Keys
Question
What broad term encompasses the use of different products to identify, authenticate, and authorize users through automated means?

A)Identity Data
B)Identity Security
C)Identity Management
D)All of the above
Question
What security measure analysis is a unique personal attribute or behavior?

A)Fingerprints
B)Biometrics
C)Iris Scan
D)All of the above
Question
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis is the most accurate?

A)Fingerprints
B)Signature Dynamics
C)Iris Scan
D)Hand Geometry
Question
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis looks at different peaks and valleys of the hand?

A)Fingerprints
B)Signature Dynamics
C)Hand Topography
D)Hand Geometry
Question
Olivia provided security features that control how users and systems communicate and interact with other systems and resources. What did Olivia create?

A)Access Controls
B)Access Limitations
C)Control Accesses
D)Limited Access
Question
Once an organization determines it needs to have access control techniques and technologies in place, it must choose which kind. What kind uses specific rules that indicative what can and cannot happen between a subject and an object?

A)Capability Table
B)Context-based Access
C)Rule-based Access
D)Access Control List
Question
What protocol combines the authentication and authorization functionality?

A)Roaming Operations
B)RADIUS
C)TACACS
D)Diameter
Question
What method gives control of access to the people that are closer to the resources that may better understand who should and should not have access to certain files, data, and resources?

A)Authentication Processes
B)Access Control Authentication
C)Decentralized Access Control Administration
D)Access Implementation Methods
Question
What is made up of hardware, software, and firmware components that fall within the TCB and enforces the reference monitor concept?

A)Access Monitor
B)Security Kernel
C)Reference Monitor
D)Access Kernel
Question
There are two processes taking place at the same time, as in data within a variable, through a shared resource, in an incorrect order. What term is being applied?

A)Track Condition
B)Race condition
C)Accountability Race
D)Track Race
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/17
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: ID and Access
1
What category is involved with access control layers?

A)Administrative Controls
B)Physical Controls
C)Technical Controls
D)All of the above
All of the above
2
Access control layers consist of administrative controls, physical controls, and technical controls that work at different levels of what?

A)Within their own categories
B)Within each control group
C)Both A and B
D)Neither A nor B
Within their own categories
3
What is based on the sensitivity of data and knows what actions should be allowed?

A)Database reviews
B)Cell Suppression
C)Content-dependent access control
D)Polyinstantiation
Content-dependent access control
4
What could a company do to prevent an employee from accessing a higher level of access by preventing them from even knowing it exists?

A)Database reviews
B)Cell Suppression
C)Content-Dependent Access Control
D)Polyinstantiation
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
5
What is defined as a set of objects that a subject is able to access?

A)Combined Mode
B)Virtual Memory
C)Salvaged Memory
D)Domain
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
6
Jeffery is signing in to his network station and is being challenged by a random value called a nonce. Why type of device is this?

A)Traffic Anomaly-based IDS
B)Asynchronous Token
C)Network-based Detection
D)Host-based Detection
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
7
What type of access control synchronizes with the authentication service by using time or a count as the core piece of the authentication process?

A)Traffic Anomaly-based IDS
B)Asynchronous Token
C)Synchronous Token Device
D)Cryptographic Keys
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
8
What broad term encompasses the use of different products to identify, authenticate, and authorize users through automated means?

A)Identity Data
B)Identity Security
C)Identity Management
D)All of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
9
What security measure analysis is a unique personal attribute or behavior?

A)Fingerprints
B)Biometrics
C)Iris Scan
D)All of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
10
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis is the most accurate?

A)Fingerprints
B)Signature Dynamics
C)Iris Scan
D)Hand Geometry
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
11
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis looks at different peaks and valleys of the hand?

A)Fingerprints
B)Signature Dynamics
C)Hand Topography
D)Hand Geometry
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
12
Olivia provided security features that control how users and systems communicate and interact with other systems and resources. What did Olivia create?

A)Access Controls
B)Access Limitations
C)Control Accesses
D)Limited Access
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
13
Once an organization determines it needs to have access control techniques and technologies in place, it must choose which kind. What kind uses specific rules that indicative what can and cannot happen between a subject and an object?

A)Capability Table
B)Context-based Access
C)Rule-based Access
D)Access Control List
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
14
What protocol combines the authentication and authorization functionality?

A)Roaming Operations
B)RADIUS
C)TACACS
D)Diameter
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
15
What method gives control of access to the people that are closer to the resources that may better understand who should and should not have access to certain files, data, and resources?

A)Authentication Processes
B)Access Control Authentication
C)Decentralized Access Control Administration
D)Access Implementation Methods
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
16
What is made up of hardware, software, and firmware components that fall within the TCB and enforces the reference monitor concept?

A)Access Monitor
B)Security Kernel
C)Reference Monitor
D)Access Kernel
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
17
There are two processes taking place at the same time, as in data within a variable, through a shared resource, in an incorrect order. What term is being applied?

A)Track Condition
B)Race condition
C)Accountability Race
D)Track Race
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 17 flashcards in this deck.