Deck 11: Access Control Fundamentals

Full screen (f)
exit full mode
Question
Which access control model can dynamically assign roles to subjects based on a set of defined rules?

A)Role Based Access Control
B)Mandatory Access Control
C)Rule Based Access Control
D)Discretionary Access Control
Use Space or
up arrow
down arrow
to flip the card.
Question
Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?

A)RADIUS
B)ICMP
C)FTP
D)Telnet
Question
What authentication service commonly used on UNIX devices involves communicating user authentication information to a centralized server?

A)TACACS
B)RADIUS
C)Kerberos
D)FTP
Question
What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?

A)LDAP poisoning
B)Kerberos injection
C)LDAP injection
D)DAP hijacking
Question
A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as:

A)Separation of duties
B)Job rotation
C)Mandatory vacation
D)Role reversal
Question
Entries within a Directory Information Base are arranged in a tree structure called the:

A)DAP
B)PEAP
C)EAP
D)DIT
Question
What is the name for a predefined framework that can be used for controlling access, and is embedded into software and hardware?

A)accounting and access model
B)user control model
C)access control model
D)authorization control model
Question
Group policy is a Unix feature that allows for the centralized management and configuration of computers and remote users using Unix Active Directory.
Question
Which access control model is considered to be the least restrictive?

A)Role Based Access Control
B)Mandatory Access Control
C)Rule Based Access Control
D)Discretionary Access Control
Question
In a UAC prompt, what color is used to indicate the lowest level of risk?

A)red
B)gray
C)yellow
D)green
Question
User accounts that remain active after an employee has left an organization are referred to as being what type of accounts?

A)Active
B)Stale
C)Orphaned
D)Fragmented
Question
Authorization and access are viewed as synonymous and in access control, they are the same step.
Question
A shield icon warns users if they attempt to access any feature that requires UAC permission.
Question
The Bell-LaPadula (BLP) model of MAC can be used to prevent subjects from creating a new object or performing specific functions on objects that are at a lower level than their own.​
Question
What access control model below is considered to be the most restrictive access control model, and involves assigning access controls to users strictly according to the custodian?

A)Mandatory Access Control
B)Role Based Access Control
C)Discretionary Access Control
D)Rule Based Access Control
Question
The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server.
Question
When using Role Based Access Control (RBAC), permissions are assigned to:

A)Roles
B)Groups
C)Labels
D)Users
Question
Select below the access control model that uses access based on a user's job function within an organization:

A)Role Based Access Control
B)Rule Based Access Control
C)Discretionary Access Control
D)Mandatory Access Control
Question
A user or a process functioning on behalf of the user that attempts to access an object is known as the:

A)subject
B)reference monitor
C)entity
D)label
Question
The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following options?

A)DIB
B)DAP
C)DIT
D)LDAP
Question
Select below the authentication system developed by the Massachusetts Institute of Technology (MIT) to verify the identity of network users:

A)Aurora
B)Kerberos
C)CHAP
D)TACACS
Question
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
​Limitation imposed as to when a user can log in to a system or access resources.
Question
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
The act of moving individuals from one job responsibility to another.​
Question
The action that is taken by a subject over an object is called a(n):

A)authorization
B)access
C)control
D)operation
Question
During RADIUS authentication, what type of packet includes information such as identification of a specific AP that is sending the packet and the username and password?

A)accounting request
B)access request
C)verification request
D)authentication request
Question
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
​The practice of requiring that processes should be divided between two or more individuals.
Question
In the DAC model, ____________________ can create and access their objects freely.
Question
To prevent one individual from having too much control, employees can ____________ job responsibilities within their home department or across positions in other departments.
Question
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
An attack that constructs LDAP statements based on user input statements, allowing the attacker to retrieve information from the LDAP database or modify its content.​
Question
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
The second version of the Terminal Access Control Access Control System (TACACS) authentication service.​
Question
A list that specifies which subjects are allowed to access an object and what operations they can perform on it is referred to as a(n):

A)ACE
B)DAC
C)entity
D)ACL
Question
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
​The most restrictive access control model, typically found in military settings in which security is of supreme importance.
Question
To assist with controlling orphaned and dormant accounts, what can be used to indicate when an account is no longer active?

A)Password expiration
B)Account expiration
C)Last login
D)Account last used
Question
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
The current version of the Terminal Access Control Access Control System (TACACS) authentication service.​
Question
The capability to look up information by name under the X.500 standard is known as a(n) ____________________-pages service.
Question
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
Providing only the minimum amount of privileges necessary to perform a job or function.​
Question
____________________ is granting or denying approval to use specific resources.

a.​Account expiration
b.Discretionary access control (DAC)​
c.​Extended TACACS (XTACACS)
d.Job rotation​
e.​LDAP injection attack
Question
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
​The process of setting a user's account to expire
Question
A RADIUS ____________________ is a computer that forwards RADIUS messages among RADIUS clients and RADIUS servers.
Question
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
The least restrictive access control model in which the owner of the object has total control over it.​
Question
Discuss the two significant weaknesses of DAC.
Question
Describe LDAP injection attacks.
Question
Discuss the differences between DAP and LDAP.
Question
Describe the Bell-LaPadula model.
Question
List the steps for RADIUS authentication with a wireless device in an IEEE 802.1x network.
Question
Describe how Kerberos works.
Question
List two major access control models.
Question
List two of the most common types of authentication and AA servers.
Question
Describe the MAC lattice model.
Question
Describe the two key elements of the MAC model.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Access Control Fundamentals
1
Which access control model can dynamically assign roles to subjects based on a set of defined rules?

A)Role Based Access Control
B)Mandatory Access Control
C)Rule Based Access Control
D)Discretionary Access Control
C
2
Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?

A)RADIUS
B)ICMP
C)FTP
D)Telnet
A
3
What authentication service commonly used on UNIX devices involves communicating user authentication information to a centralized server?

A)TACACS
B)RADIUS
C)Kerberos
D)FTP
A
4
What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?

A)LDAP poisoning
B)Kerberos injection
C)LDAP injection
D)DAP hijacking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as:

A)Separation of duties
B)Job rotation
C)Mandatory vacation
D)Role reversal
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Entries within a Directory Information Base are arranged in a tree structure called the:

A)DAP
B)PEAP
C)EAP
D)DIT
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What is the name for a predefined framework that can be used for controlling access, and is embedded into software and hardware?

A)accounting and access model
B)user control model
C)access control model
D)authorization control model
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Group policy is a Unix feature that allows for the centralized management and configuration of computers and remote users using Unix Active Directory.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which access control model is considered to be the least restrictive?

A)Role Based Access Control
B)Mandatory Access Control
C)Rule Based Access Control
D)Discretionary Access Control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
In a UAC prompt, what color is used to indicate the lowest level of risk?

A)red
B)gray
C)yellow
D)green
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
User accounts that remain active after an employee has left an organization are referred to as being what type of accounts?

A)Active
B)Stale
C)Orphaned
D)Fragmented
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Authorization and access are viewed as synonymous and in access control, they are the same step.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
A shield icon warns users if they attempt to access any feature that requires UAC permission.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The Bell-LaPadula (BLP) model of MAC can be used to prevent subjects from creating a new object or performing specific functions on objects that are at a lower level than their own.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
What access control model below is considered to be the most restrictive access control model, and involves assigning access controls to users strictly according to the custodian?

A)Mandatory Access Control
B)Role Based Access Control
C)Discretionary Access Control
D)Rule Based Access Control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
When using Role Based Access Control (RBAC), permissions are assigned to:

A)Roles
B)Groups
C)Labels
D)Users
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Select below the access control model that uses access based on a user's job function within an organization:

A)Role Based Access Control
B)Rule Based Access Control
C)Discretionary Access Control
D)Mandatory Access Control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
A user or a process functioning on behalf of the user that attempts to access an object is known as the:

A)subject
B)reference monitor
C)entity
D)label
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following options?

A)DIB
B)DAP
C)DIT
D)LDAP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Select below the authentication system developed by the Massachusetts Institute of Technology (MIT) to verify the identity of network users:

A)Aurora
B)Kerberos
C)CHAP
D)TACACS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
​Limitation imposed as to when a user can log in to a system or access resources.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
The act of moving individuals from one job responsibility to another.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The action that is taken by a subject over an object is called a(n):

A)authorization
B)access
C)control
D)operation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
During RADIUS authentication, what type of packet includes information such as identification of a specific AP that is sending the packet and the username and password?

A)accounting request
B)access request
C)verification request
D)authentication request
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
​The practice of requiring that processes should be divided between two or more individuals.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
In the DAC model, ____________________ can create and access their objects freely.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
To prevent one individual from having too much control, employees can ____________ job responsibilities within their home department or across positions in other departments.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
An attack that constructs LDAP statements based on user input statements, allowing the attacker to retrieve information from the LDAP database or modify its content.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
The second version of the Terminal Access Control Access Control System (TACACS) authentication service.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A list that specifies which subjects are allowed to access an object and what operations they can perform on it is referred to as a(n):

A)ACE
B)DAC
C)entity
D)ACL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
​The most restrictive access control model, typically found in military settings in which security is of supreme importance.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
To assist with controlling orphaned and dormant accounts, what can be used to indicate when an account is no longer active?

A)Password expiration
B)Account expiration
C)Last login
D)Account last used
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
The current version of the Terminal Access Control Access Control System (TACACS) authentication service.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The capability to look up information by name under the X.500 standard is known as a(n) ____________________-pages service.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
Providing only the minimum amount of privileges necessary to perform a job or function.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
____________________ is granting or denying approval to use specific resources.

a.​Account expiration
b.Discretionary access control (DAC)​
c.​Extended TACACS (XTACACS)
d.Job rotation​
e.​LDAP injection attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
​The process of setting a user's account to expire
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A RADIUS ____________________ is a computer that forwards RADIUS messages among RADIUS clients and RADIUS servers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Matching
a. Account expiration
b. Discretionary access control (DAC)
c. Extended TACACS (XTACACS)
d. Job rotation
e. LDAP injection attack
f. Least privilege
g. Mandatory access control (MAC)
h. Separation of duties
i. TACACS+
j. Time-of-day restriction
The least restrictive access control model in which the owner of the object has total control over it.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the two significant weaknesses of DAC.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe LDAP injection attacks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss the differences between DAP and LDAP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe the Bell-LaPadula model.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
List the steps for RADIUS authentication with a wireless device in an IEEE 802.1x network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Describe how Kerberos works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
List two major access control models.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List two of the most common types of authentication and AA servers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Describe the MAC lattice model.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe the two key elements of the MAC model.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.