21 Flashcards
Group-based access control in MS Windows environments is an example of:
** RBAC **
Group-based access control in MS Windows environments is an example of RBAC, which stands for Role-Based Access Control.
An access control model in which access to resources is granted or denied depending on the contents of Access Control List (ACL) entries is called:
** Rule-Based Access Control **
The access control model in which access to resources is granted or denied depending on the contents of Access Control List (ACL) entries is called Rule-Based Access Control (RBAC).
In RBAC, access control decisions are based on rules specified in ACLs associated with resources. These rules define which users or groups have permission to access specific resources and what actions they can perform on those resources. ACLs consist of entries that match users or groups to specific permissions or access rights.
Which of the following answers refer to the Rule-Based Access Control (RBAC) model? (Select 2 answers)
- Access to resources granted or denied depending on Access Control List (ACL) entries
- Implemented in network devices such as firewalls to control inbound and outbound traffic based on filtering rules
Which of the following answers list the characteristic features of the Mandatory Access Control (MAC) model? (Select 3 answers)
- Users are not allowed to change access policies at their own discretion
- Labels and clearance levels can only be applied and changed by an administrator
- Every resource has a sensitivity label matching a clearance level assigned to a user
Which of the following access control models enforces the strictest set of access rules?
** MAC **
MAC (Mandatory Access Control) enforces the strictest set of access rules. In MAC, access control decisions are based on security labels and clearances assigned to both users and resources. These labels and clearances are determined by administrators and follow a strict security policy. Users can only access resources for which they have the necessary clearance level, and they cannot arbitrarily change access permissions.
MAC is commonly used in high-security environments where access control is critical and needs to be rigorously enforced to protect sensitive information.
Discretionary Access Control (DAC) is an access control model based on user identity. In DAC, every object has an owner who at his/her own discretion determines what kind of permissions other users can have to that object.
True
A security solution that provides control over elevated (i.e. administrative type) accounts is known as:
** PAM **
A security solution that provides control over elevated (i.e., administrative-type) accounts is known as PAM, which stands for Pluggable Authentication Module.
PAM is a framework used in Unix-like operating systems to manage authentication, including the authentication of administrative accounts. It provides a modular and flexible way to configure and enforce authentication policies for various types of accounts, including those with elevated privileges, such as root or administrator accounts. PAM allows system administrators to control and customize authentication methods, ensuring secure access to administrative accounts.
Which of the following answers refers to a rule-based access control mechanism associated with files and/or directories?
** FACL **
The rule-based access control mechanism associated with files and/or directories is FACL, which stands for File Access Control Lists.
Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?
** PKI **
The term that refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is PKI, which stands for Public Key Infrastructure.
PKI is a framework that includes policies, standards, and technologies for securing communication and verifying the identities of users, devices, and services in a networked environment. It involves the use of digital certificates issued by Certificate Authorities (CAs) to authenticate and secure data transmission. PKI plays a crucial role in ensuring the confidentiality, integrity, and authenticity of digital information and communications.
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:
** CA **
certificate authority (CA)
What is the PKI role of Registration Authority (RA)?
- Accepting requests for digital certificates
- Authenticating the entity making the request
Which of the following solutions allow to check whether a digital certificate has been revoked? (Select 2 answers)
- CRL (Certificate Revocation List): A Certificate Revocation List is a regularly updated list maintained by a Certificate Authority (CA) that contains information about certificates that have been revoked before their expiration dates. Clients can check the CRL to see if a particular certificate has been revoked.)
- OCSP (Online Certificate Status Protocol): OCSP is a protocol used to obtain the revocation status of a digital certificate in real-time. Instead of relying on periodically updated lists like CRLs, OCSP allows a client to send a request to the CA or an OCSP responder to check the status of a certificate at the moment of the request.)
What is the fastest way for checking the validity of a digital certificate?
** OCSP **
(Online Certificate Status Protocol): OCSP is a protocol used to obtain the revocation status of a digital certificate in real-time. Instead of relying on periodically updated lists like CRLs, OCSP allows a client to send a request to the CA or an OCSP responder to check the status of a certificate at the moment of the request.)
Which of the answers listed below refers to a method for requesting a digital certificate?
** CSR **
Certificate signing request
In a digital certificate, the Common Name (CN) field describes a device, an individual, an organization, or any other entity the certificate has been issued for. In an SSL certificate, CN refers to the Fully Qualified Domain Name (FQDN), which is the domain name of the server protected by the SSL certificate
True