Deck 5: ID and Access
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/17
Play
Full screen (f)
Deck 5: ID and Access
1
What category is involved with access control layers?
A)Administrative Controls
B)Physical Controls
C)Technical Controls
D)All of the above
A)Administrative Controls
B)Physical Controls
C)Technical Controls
D)All of the above
All of the above
2
Access control layers consist of administrative controls, physical controls, and technical controls that work at different levels of what?
A)Within their own categories
B)Within each control group
C)Both A and B
D)Neither A nor B
A)Within their own categories
B)Within each control group
C)Both A and B
D)Neither A nor B
Within their own categories
3
What is based on the sensitivity of data and knows what actions should be allowed?
A)Database reviews
B)Cell Suppression
C)Content-dependent access control
D)Polyinstantiation
A)Database reviews
B)Cell Suppression
C)Content-dependent access control
D)Polyinstantiation
Content-dependent access control
4
What could a company do to prevent an employee from accessing a higher level of access by preventing them from even knowing it exists?
A)Database reviews
B)Cell Suppression
C)Content-Dependent Access Control
D)Polyinstantiation
A)Database reviews
B)Cell Suppression
C)Content-Dependent Access Control
D)Polyinstantiation
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
5
What is defined as a set of objects that a subject is able to access?
A)Combined Mode
B)Virtual Memory
C)Salvaged Memory
D)Domain
A)Combined Mode
B)Virtual Memory
C)Salvaged Memory
D)Domain
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
6
Jeffery is signing in to his network station and is being challenged by a random value called a nonce. Why type of device is this?
A)Traffic Anomaly-based IDS
B)Asynchronous Token
C)Network-based Detection
D)Host-based Detection
A)Traffic Anomaly-based IDS
B)Asynchronous Token
C)Network-based Detection
D)Host-based Detection
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
7
What type of access control synchronizes with the authentication service by using time or a count as the core piece of the authentication process?
A)Traffic Anomaly-based IDS
B)Asynchronous Token
C)Synchronous Token Device
D)Cryptographic Keys
A)Traffic Anomaly-based IDS
B)Asynchronous Token
C)Synchronous Token Device
D)Cryptographic Keys
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
8
What broad term encompasses the use of different products to identify, authenticate, and authorize users through automated means?
A)Identity Data
B)Identity Security
C)Identity Management
D)All of the above
A)Identity Data
B)Identity Security
C)Identity Management
D)All of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
9
What security measure analysis is a unique personal attribute or behavior?
A)Fingerprints
B)Biometrics
C)Iris Scan
D)All of the above
A)Fingerprints
B)Biometrics
C)Iris Scan
D)All of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
10
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis is the most accurate?
A)Fingerprints
B)Signature Dynamics
C)Iris Scan
D)Hand Geometry
A)Fingerprints
B)Signature Dynamics
C)Iris Scan
D)Hand Geometry
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
11
Biometrics measures unique personal attributes or behaviors. What type of biometric analysis looks at different peaks and valleys of the hand?
A)Fingerprints
B)Signature Dynamics
C)Hand Topography
D)Hand Geometry
A)Fingerprints
B)Signature Dynamics
C)Hand Topography
D)Hand Geometry
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
12
Olivia provided security features that control how users and systems communicate and interact with other systems and resources. What did Olivia create?
A)Access Controls
B)Access Limitations
C)Control Accesses
D)Limited Access
A)Access Controls
B)Access Limitations
C)Control Accesses
D)Limited Access
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
13
Once an organization determines it needs to have access control techniques and technologies in place, it must choose which kind. What kind uses specific rules that indicative what can and cannot happen between a subject and an object?
A)Capability Table
B)Context-based Access
C)Rule-based Access
D)Access Control List
A)Capability Table
B)Context-based Access
C)Rule-based Access
D)Access Control List
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
14
What protocol combines the authentication and authorization functionality?
A)Roaming Operations
B)RADIUS
C)TACACS
D)Diameter
A)Roaming Operations
B)RADIUS
C)TACACS
D)Diameter
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
15
What method gives control of access to the people that are closer to the resources that may better understand who should and should not have access to certain files, data, and resources?
A)Authentication Processes
B)Access Control Authentication
C)Decentralized Access Control Administration
D)Access Implementation Methods
A)Authentication Processes
B)Access Control Authentication
C)Decentralized Access Control Administration
D)Access Implementation Methods
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
16
What is made up of hardware, software, and firmware components that fall within the TCB and enforces the reference monitor concept?
A)Access Monitor
B)Security Kernel
C)Reference Monitor
D)Access Kernel
A)Access Monitor
B)Security Kernel
C)Reference Monitor
D)Access Kernel
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
17
There are two processes taking place at the same time, as in data within a variable, through a shared resource, in an incorrect order. What term is being applied?
A)Track Condition
B)Race condition
C)Accountability Race
D)Track Race
A)Track Condition
B)Race condition
C)Accountability Race
D)Track Race
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck