Deck 4: Access Control
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 4: Access Control
1
A constraint is a defined relationship among roles or a condition related toroles.
True
2
__________ is verification that the credentials of a user or other system entity are valid.
A) Adequacy
B) Authentication
C) Authorization
D) Audit
A) Adequacy
B) Authentication
C) Authorization
D) Audit
B
3
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.
A) Audit control
B) Resource control
C) System control
D) Access control
A) Audit control
B) Resource control
C) System control
D) Access control
D
4
An ABAC model can define authorizations that express conditions onproperties of both the resource and the subject.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Access control is the central element of computer security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
A user may belong to multiple groups.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Any program that is owned by, and SetUID to, the "superuser" potentiallygrants unrestricted access to the system to any user executing that program.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
External devices such as firewalls cannot provide access control services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The default set of rights should always follow the rule of least privilege orread-only access
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
__________ controls access based on comparing security labels with security clearances.
A) MAC
B) DAC
C) RBAC
D) MBAC
A) MAC
B) DAC
C) RBAC
D) MBAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
__________ is the traditional method of implementing access control.
A) MAC
B) RBAC
C) DAC
D) MBAC
A) MAC
B) RBAC
C) DAC
D) MBAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Traditional RBAC systems define the access rights of individual users andgroups of users.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
_________ is the granting of a right or permission to a system entity to access a system resource.
A) Authorization
B) Authentication
C) Control
D) Monitoring
A) Authorization
B) Authentication
C) Control
D) Monitoring
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
An access right describes the way in which a subject may access an object.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
The principal objectives of computer security are to preventunauthorized users from gaining access to resources, to prevent legitimate users from accessing resources in an unauthorized manner, and to enable legitimate users to access resources in an authorized manner.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The authentication function determines who is trusted for a given purpose.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
An auditing function monitors and keeps a record of user accesses tosystem resources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Reliable input is an access control requirement.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A user program executes in a kernel mode in which certain areas of memoryare protected from the user's use and certain instructions may not be executed.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Security labels indicate which system entities are eligible to access certainresources.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A __________ is an entity capable of accessing objects.
A) group
B) object
C) subject
D) owner
A) group
B) object
C) subject
D) owner
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) __________ is a resource to which access is controlled.
A) object
B) owner
C) world
D) subject
A) object
B) owner
C) world
D) subject
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ access control controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Role hierarchies make use of the concept of __________ to enable one role to implicitly include access rights associated with a subordinate role.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
X.800 defines __________ as the prevention of unauthorized use of a resource,including the prevention of use of a resource in an unauthorized manner.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
A __________ is a named job function within the organization that controls this computer system.
A) user
B) role
C) permission
D) session
A) user
B) role
C) permission
D) session
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ is based on the roles the users assume in a system rather than the user's identity.
A) DAC
B) RBAC
C) MAC
D) URAC
A) DAC
B) RBAC
C) MAC
D) URAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
__________ refers to setting a maximum number with respect to roles.
A) Cardinality
B) Prerequisite
C) Exclusive
D) Hierarchy
A) Cardinality
B) Prerequisite
C) Exclusive
D) Hierarchy
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
Basic access control systems typically define three classes of subject: owner, __________ and world.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
__________ provide a means of adapting RBAC to the specifics of administrative and security policies in an organization.
A) Constraints
B) Mutually Exclusive Roles
C) Cardinality
D) Prerequisites
A) Constraints
B) Mutually Exclusive Roles
C) Cardinality
D) Prerequisites
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The basic elements of access control are: subject, __________, and access right.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The __________ user ID is exempt from the usual file access control constraints and has system wide access.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
__________ access control controls access based on the identity of the requestor and on access rules stating what requestors are or are not allowed to do.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A __________ access control scheme is one in which an entity may be granted access rights that permit the entity, by its own volition, to enable another entity to access some resource.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures is a(n) __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
Subject attributes, object attributes and environment attributes are the three types of attributes in the __________ model.
A) DSD
B) RBAC
C) ABAC
D) SSD
A) DSD
B) RBAC
C) ABAC
D) SSD
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The __________ component deals with the management and control of theways entities are granted access to resources.
A) resource management
B) access management
C) privilege management
D) policy management ¸
A) resource management
B) access management
C) privilege management
D) policy management ¸
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A concept that evolved out of requirements for military information security is ______ .
A) reliable input
B) mandatory access control
C) open and closed policies
D) discretionary input
A) reliable input
B) mandatory access control
C) open and closed policies
D) discretionary input
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A __________ is a mapping between a user and an activated subset of the set of roles to which the user is assigned.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The final permission bit is the _________ bit.
A) superuser
B) kernel
C) set user
D) sticky
A) superuser
B) kernel
C) set user
D) sticky
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The three types of attributes in the ABAC model are subject attributes, object attributes, and _________ attributes.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A __________ is an object or data structure that authoritatively binds an identity to a token possessed and controlled by a subscriber.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
A __________ dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role and can be used to structure the implementation of the least privilege concept.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
In digital identity systems, a __________ functions as a certification program.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
There are three key elements to an ABAC model: attributes which are defined for entities in a configuration; a policy model, which defines the ABAC policies; and the __________ model, which applies to policies that enforce access control.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck