21 Flashcards

1
Q

Group-based access control in MS Windows environments is an example of:

A

** RBAC **

Group-based access control in MS Windows environments is an example of RBAC, which stands for Role-Based Access Control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An access control model in which access to resources is granted or denied depending on the contents of Access Control List (ACL) entries is called:

A

** Rule-Based Access Control **

The access control model in which access to resources is granted or denied depending on the contents of Access Control List (ACL) entries is called Rule-Based Access Control (RBAC).

In RBAC, access control decisions are based on rules specified in ACLs associated with resources. These rules define which users or groups have permission to access specific resources and what actions they can perform on those resources. ACLs consist of entries that match users or groups to specific permissions or access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refer to the Rule-Based Access Control (RBAC) model? (Select 2 answers)

A
  • Access to resources granted or denied depending on Access Control List (ACL) entries
  • Implemented in network devices such as firewalls to control inbound and outbound traffic based on filtering rules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers list the characteristic features of the Mandatory Access Control (MAC) model? (Select 3 answers)

A
  • Users are not allowed to change access policies at their own discretion
  • Labels and clearance levels can only be applied and changed by an administrator
  • Every resource has a sensitivity label matching a clearance level assigned to a user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following access control models enforces the strictest set of access rules?

A

** MAC **

MAC (Mandatory Access Control) enforces the strictest set of access rules. In MAC, access control decisions are based on security labels and clearances assigned to both users and resources. These labels and clearances are determined by administrators and follow a strict security policy. Users can only access resources for which they have the necessary clearance level, and they cannot arbitrarily change access permissions.

MAC is commonly used in high-security environments where access control is critical and needs to be rigorously enforced to protect sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Discretionary Access Control (DAC) is an access control model based on user identity. In DAC, every object has an owner who at his/her own discretion determines what kind of permissions other users can have to that object.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security solution that provides control over elevated (i.e. administrative type) accounts is known as:

A

** PAM **

A security solution that provides control over elevated (i.e., administrative-type) accounts is known as PAM, which stands for Pluggable Authentication Module.

PAM is a framework used in Unix-like operating systems to manage authentication, including the authentication of administrative accounts. It provides a modular and flexible way to configure and enforce authentication policies for various types of accounts, including those with elevated privileges, such as root or administrator accounts. PAM allows system administrators to control and customize authentication methods, ensuring secure access to administrative accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following answers refers to a rule-based access control mechanism associated with files and/or directories?

A

** FACL **

The rule-based access control mechanism associated with files and/or directories is FACL, which stands for File Access Control Lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?

A

** PKI **

The term that refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is PKI, which stands for Public Key Infrastructure.

PKI is a framework that includes policies, standards, and technologies for securing communication and verifying the identities of users, devices, and services in a networked environment. It involves the use of digital certificates issued by Certificate Authorities (CAs) to authenticate and secure data transmission. PKI plays a crucial role in ensuring the confidentiality, integrity, and authenticity of digital information and communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:

A

** CA **

certificate authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the PKI role of Registration Authority (RA)?

A
  • Accepting requests for digital certificates
  • Authenticating the entity making the request
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following solutions allow to check whether a digital certificate has been revoked? (Select 2 answers)

A
  • CRL (Certificate Revocation List): A Certificate Revocation List is a regularly updated list maintained by a Certificate Authority (CA) that contains information about certificates that have been revoked before their expiration dates. Clients can check the CRL to see if a particular certificate has been revoked.)
  • OCSP (Online Certificate Status Protocol): OCSP is a protocol used to obtain the revocation status of a digital certificate in real-time. Instead of relying on periodically updated lists like CRLs, OCSP allows a client to send a request to the CA or an OCSP responder to check the status of a certificate at the moment of the request.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the fastest way for checking the validity of a digital certificate?

A

** OCSP **

(Online Certificate Status Protocol): OCSP is a protocol used to obtain the revocation status of a digital certificate in real-time. Instead of relying on periodically updated lists like CRLs, OCSP allows a client to send a request to the CA or an OCSP responder to check the status of a certificate at the moment of the request.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the answers listed below refers to a method for requesting a digital certificate?

A

** CSR **

Certificate signing request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a digital certificate, the Common Name (CN) field describes a device, an individual, an organization, or any other entity the certificate has been issued for. In an SSL certificate, CN refers to the Fully Qualified Domain Name (FQDN), which is the domain name of the server protected by the SSL certificate

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which digital certificate type allows multiple subdomains to be protected by a single certificate?

A

Wildcard certificate

17
Q

A digital certificate which allows multiple domains to be protected by a single certificate is known as:

A

Subject Alternative Name (SAN) certificate

18
Q

Code-signing certificates are used to verify the authenticity and integrity of software. Self-signed certificates have a lower level of trustworthiness, because they are not signed by a Certificate Authority (CA). Computer certificates (a.k.a. machine certificates) are used to prove the identity of devices. S/MIME certificates are used to encrypt and digitally sign email messages. User digital certificates provide improved security during authentication and authorization of individuals. Root certificates are self-signed certificates that identify a root Certificate Authority (CA). Domain validation certificates prove a user’s ownership rights to a domain. Extended Validation (EV) certificates provide the highest level of trust and protection.

A

True

19
Q

What are the characteristic features of the Distinguished Encoding Rules (DER) digital certificate format? (Select 3 answers)

A
  • Encoded in binary format
  • .der and .cer file extensions
  • Generally used for Java servers
20
Q

Which of the following answers refer to the Privacy Enhanced Email (PEM) digital certificate format?

A
  • Encoded in text (ASCII Base64) format
  • .pem, .crt, .cer and .key file extensions
  • Generally used for Apache servers or similar configurations
21
Q

What are the characteristic features of the Personal Information Exchange (PFX) and P12 digital certificate format? (Select 3 answers)

A
  • .pfx and .p12 file extensions
  • Generally used for Microsoft windows servers
  • Encoded in binary format
22
Q

Which of the following answers refer to the P7B digital certificate format?

A
  • Encoded in text (ASCII Base64) format
  • .p7b file extension
  • Generally used for Microsoft windows and Java Tomcat servers
23
Q

Which of the following allows for checking digital certificate revocation status without contacting Certificate Authority (CA)?

A

** Stapling **

The option that allows for checking digital certificate revocation status without contacting the Certificate Authority (CA) is Stapling.

Certificate Stapling, specifically OCSP Stapling (Online Certificate Status Protocol Stapling), is a technique used in SSL/TLS connections. In OCSP Stapling, the web server, instead of the client, contacts the CA’s OCSP responder to obtain the certificate revocation status and then “staples” that status information to the server’s certificate during the TLS handshake. This allows the client to check the revocation status without directly contacting the CA, improving security and performance.

24
Q

Which of the following answers refers to a deprecated security mechanism designed to defend HTTPS websites against impersonation attacks performed with the use of fraudulent digital certificates?

A

** Pinning **

Pinning - A security mechanism used by some web sites to prevent web site impersonation. Web sites provide clients with a list of public key hashes

25
Q

Which of the answers listed below refer to examples of PKI trust models?

A
  • Single CA model
  • Hierarchical model (root CA + intermediate CAs)
  • Mesh model (cross-certifying CAs)
  • Web of trust model (all CAs act as root CAs)
  • Client-server mutual authentication model
    All of the above