Deck 9: Access Control Fundamentals
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 9: Access Control Fundamentals
1
The most restrictive access control model is ____.
A) Mandatory Access Control
B) Role Based Access Control
C) Discretionary Access Control
D) Rule Based Access Control
A) Mandatory Access Control
B) Role Based Access Control
C) Discretionary Access Control
D) Rule Based Access Control
A
2
A user accessing a computer system must present credentials or ____ when logging on to the system.
A) access
B) authorize
C) token
D) identification
A) access
B) authorize
C) token
D) identification
D
3
The action that is taken by the subject over the object is called a(n) ____.
A) authorization
B) access
C) control
D) operation
A) authorization
B) access
C) control
D) operation
D
4
____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.
A) Separation of duties
B) Job rotation
C) Mandatory vacation
D) Role reversal
A) Separation of duties
B) Job rotation
C) Mandatory vacation
D) Role reversal
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
A) RADIUS
B) ICMP
C) FTP
D) Telnet
A) RADIUS
B) ICMP
C) FTP
D) Telnet
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
TACACS+ and RADIUS are designed to support hundreds of remote connections.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
A(n) ____ is a set of permissions that are attached to an object.
A) ACE
B) DAC
C) entity
D) ACL
A) ACE
B) DAC
C) entity
D) ACL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ model is the least restrictive.
A) RBAC
B) MAC
C) CAC
D) DAC
A) RBAC
B) MAC
C) CAC
D) DAC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
A) subject
B) reference monitor
C) entity
D) label
A) subject
B) reference monitor
C) entity
D) label
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Authorization and access are viewed as synonymous and in access control, they are the same step.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ is considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
A) Role Based Access Control
B) Rule Based Access Control
C) Discretionary Access Control
D) Mandatory Access Control
A) Role Based Access Control
B) Rule Based Access Control
C) Discretionary Access Control
D) Mandatory Access Control
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
In the UAC dialog boxes, the color ____ indicates the lowest risk.
A) red
B) gray
C) yellow
D) green
A) red
B) gray
C) yellow
D) green
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ indicates when an account is no longer active.
A) Password expiration
B) Account expiration
C) Last login
D) Account last used
A) Password expiration
B) Account expiration
C) Last login
D) Account last used
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A user under Role Based Access Control can be assigned only one ____.
A) role
B) group
C) label
D) access list
A) role
B) group
C) label
D) access list
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) ____ model is a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
A) accounting
B) user control
C) access control
D) authorization control
A) accounting
B) user control
C) access control
D) authorization control
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ accounts are user accounts that remain active after an employee has left an organization.
A) Active
B) Stale
C) Orphaned
D) Fragmented
A) Active
B) Stale
C) Orphaned
D) Fragmented
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A shield icon warns users if they attempt to access any feature that requires UAC permission.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ is often used for managing user access to one or more systems.
A) Role Based Access Control
B) Mandatory Access Control
C) Rule Based Access Control
D) Discretionary Access Control
A) Role Based Access Control
B) Mandatory Access Control
C) Rule Based Access Control
D) Discretionary Access Control
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____________________ is granting or denying approval to use specific resources.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
List two of the most common types of authentication and AA servers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
List the steps for RADIUS authentication with a wireless device in an IEEE 802.1x network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
A) Aurora
B) Kerberos
C) CHAP
D) TACACS
A) Aurora
B) Kerberos
C) CHAP
D) TACACS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
A) TACACS
B) RADIUS
C) Kerberos
D) FTP
A) TACACS
B) RADIUS
C) Kerberos
D) FTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____.
A) accounting request
B) access request
C) verification request
D) authentication request
A) accounting request
B) access request
C) verification request
D) authentication request
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A RADIUS ____________________ is a computer that forwards RADIUS messages among RADIUS clients and RADIUS servers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Describe the two key elements of the MAC model.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Describe the Bell-LaPadula model.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Describe how Kerberos works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
List two major access control models.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
A) DIB
B) DAP
C) DIT
D) LDAP
A) DIB
B) DAP
C) DIT
D) LDAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Entries in the DIB are arranged in a tree structure called the ____.
A) DAP
B) PEAP
C) EAP
D) DIT
A) DAP
B) PEAP
C) EAP
D) DIT
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
In the DAC model, ____________________ can create and access their objects freely.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Often ____________________ results from a single user being trusted with a set of responsibilities that place the person in complete control of the process.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____ attacks may allow an attacker to construct LDAP statements based on user input statements.
A) SQL injection
B) Kerberos injection
C) LDAP injection
D) RADIUS injection
A) SQL injection
B) Kerberos injection
C) LDAP injection
D) RADIUS injection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The capability to look up information by name under the X.500 standard is known as a(n) ____________________-pages service.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Describe the MAC lattice model.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Discuss the two significant weaknesses of DAC.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe LDAP injection attacks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the differences between DAP and LDAP.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck