3 : Logical Access Flashcards

1
Q

logical access controls in information technology

A

logical access controls are tools and protocols used for

identification, authentication, authorization, and accountability in computer information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The two main types of access controls

A

physical and logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical access control

A

Limits access to campuses, buildings, facilities, and physical IT assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logical access control

A

Limits connections to computer networks, system files and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The four main categories of access controls are

A

Mandatory Access Control
Discretionary access control
Role-based access control
Rule-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mandatory Access Control (MAC)

A

(MACs) are logical access control that cannot be controlled or modified by normal users or data owners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Discretionary Access Control (DAC)

A

(DACs) are logical access control that may be activated or modified by the data owners at their discretion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MAC compared to DAC ; in terms of data security, which is the best choice

A

MACs are better choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steps to follow when implementing logical access contros

A

1- Inventory of IS resources
2-Classification of IS resources
3-Grouping/labeling of IS resources
4-Creation of an access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the first step on data classification

A

Identify the owner of the data/application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Automated password management tool vs Manual password management tool

A

In any given scenario, an automated password management tool works as best preventive control and ensures compliance with password management policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

preventive controls as compared to detective and deterrent controls

A

In any given scenario, preference to be given to preventive controls as compared to detective or deterrent controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Automated controls as compared to manual controls

A

In any given scenario, preference to be given to automated controls as compared to manual controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the prime objective of review of logical access control

A

to ensure access have been assigned as per organization’s authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly