Acc Ctrl Flashcards

1
Q

3 primary types of access control

A

preventive, detective, and corrective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

secondary types of access control

A

There are also four other access control types, commonly known as deterrent, recovery, directive, and compensation access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

process by which a subject professes an identity and accountability is initiated

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

process of verifying or testing that a claimed identity is valid

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

indicates who is trusted to perform specific operation

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which AAA protocol is done via auditing, logging, and monitoring, ensures that subjects can be held accountable for their actions. Auditing is the process of tracking and recording subject activities within logs

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA token is what kind of token (sync/async, static/dynamic)?

A

is a synchronous dynamic password token. It generates passwords at fixed time intervals, such as every 60 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(sync or async) dynamic password token does not use a clock; it generates passwords based on an occurrence of some event. These tokens often generate a password after the user enters a PIN into the token device.

A

asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which access control model? Every object has an owner, owners have full control over their objects. Permissions are maintained in an ACL, and owners can easily change permissions.

A

Discretionary access control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which access control model? Access does not focus on user identity. Instead, a static set of rules governing the whole environment is used to manage access

A

Non-Dac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rule-based access controls and lattice-based access controls are both considered ….

A

non-dac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which access control model?relies upon the use of classification labels. Each classification label represents a security domain, or a realm of security.

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SSO solution for login, symmetric key crypto, AES encryption protocol. Provides confidentiality AND integrity for authentication.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AAA protocols

A

provide authentication, authorization, and accounting (sometimes ID is included). typically used for VPN and other centralized access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 common AAA protocols are …

A

RADIUS, TACACS+, and Diameter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

various TYPES of access control (7):

A

Preventive, Detective, corrective, recovery, directive, compensation, recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

birthday attack

A

birthday attack focuses on finding collisions. similar to finding two pswds with same hash. Ex = 50 ppl in room, 2 will have same bday.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a variant of phishing that uses the phone system or VoIP. A common attack uses an automated call to the user explaining a problem with a credit card account.

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

name 4 different password attacks:

A

dictionary attacks, brute-force attacks, rainbow table attacks, and sniffer attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What attack uses….all possible combinations of keyboard characters used.

A

brute-force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What attack uses…. a predefined list of possible passwords possibly used

A

dictionary attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Sym or Asym…..cryptosystems use a shared secret key available to all users of the cryptosystem.

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Sym or Asym … cryptosystems utilize individual combinations of public and private keys for each user of the system

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AND function

A

returns TRUE only when X&Y are TRUE. 1+1=1, else 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

OR function

A

returns FALSE when X&Y are FALSE. 0-0=0, else 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

NOT operation (~ or !)

A

opposite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

XOR ⊕ function

A

return TRUE is both are same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Cipher that uses an encryption algorithm to rearrange the letters of a plaintext message, forming the ciphertext message

A

Transposition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Ciphers that use the encryption algorithm to replace each character or bit of the plaintext message with a different character

A

Subsititution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

one time pad

A

powerful type of substitution cipher. One-time pads use a different substitution alphabet for each letter of the plaintext message. (EX:ceasar, Vigenere)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Cipher where the encryption key is as long as the message itself and is often chosen from a common book

A

book cipher or running key cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A kind of cipher that operate on “chunks,” or blocks, of a message and apply the encryption algorithm to an entire message block at the same time.

A

Block cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A kind of cipher that operate on one character or bit of a message (or data stream) at a time.

A

Steam cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Asymmetric key encryption

A

integrity, authentication, and non-repudiation. + /- of users easy, .regen of key incases of compromise is easy and fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Common Symmetric Cryptosystems

A

Data Encryption Standard (DES), Triple DES (3DES), International Data Encryption Algorithm (IDEA), Blowfish, Skipjack, and the Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

AES cipher

A

The AES cipher allows the use of three key strengths: 128 bits, 192 bits, and 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Diffie-Hellman

A

symetric key encryption used when offiline distribution nor public key encrypt are sufficient. Diffie-Hellman is an algo where 2 parties provide random values and extract key from: “K = S^r mod p”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

zero knowledge proof

A

Zero-knowledge proof is a communication concept. A specific type of information is exchanged but no real data is transferred, as with digital signatures and digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

importance of key importance

A

Modern cryptosystems utilize keys that are at least 128 bits long to provide adequate security. It’s generally agreed that the 56-bit key of the Data Encryption Standard (DES) is no longer sufficiently long enough to provide security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

4 modes of DES:

A

Electronic Codebook (ECB), Cipher Block Chaining (CBC) mode, Cipher Feedback (CFB), and Output Feedback (OFB) mode. ECB is least secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

AES

A

Utilizes the Rijndael algorithm The US government standard Uses key lengths of 128, 192, and 256 bits and a fixed block size of 128 bits Better than older DES algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Take-Grant

A

Take-Grant model may also adopt a create rule and a remove rule to generate or delete rights. The key to this model is that using these rules allows one to figure out when rights in the system can change and where leakage (i.e., unintentional distribution of permissions) can occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Access control matrix

A

table of subj and objs. col= acl.row= capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Goguen-Meseguer model

A

is an integrity model. The Goguen-Meseguer model is based on predetermining the set or domain—a list of objects that a subject can access. This model is based on automation theory and domain separation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Sutherland model

A

the model is based on the idea of defining a set of system states, initial states, and state transitions. Through the use of and limitations to only these predetermined secure states, integrity is maintained and interference is prohibited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Biba

A

integrity model. No write down. No read up.

47
Q

Phishing

A

Phishing is a type of social engr whose goal is to obtain PII.

48
Q

Pharming

A

Pharming redirects victims to a fake website that looks legitimate and carries out DNS poisoning (in which a DNS server resolves a host name into an incorrect IP addy).

49
Q

Authentication vs Authorization.

A

They are close in meaning but Authentication is the PROCESS of verifying id of subj requesting access. Authorization is the ACTION of granting permission

50
Q

Collusion (not to be confused with collision)

A

Collusion (not to be confused with collision)

Practice of separation of duties to force 2 or more employees to work together in efforts to avoid fraud.

51
Q

x.500 std

A

Most directories follow a hierachical db format, based on the x.500 std. The primary cocept of it is that there is a single Directory Info Tree, a hierarchical org of entries which is distributed across 1 or more servers, called directory sys agents.

52
Q

Tunneling

A

Tunneling is an attack that utilizes low-level funct to infiltrate a sys.

53
Q

T or F?

Smurf attacks is a DOS attack.

A

True

54
Q

ICMP ECHO attack

A

The attacker changes an ICMP ECHO request packet’s source IP addy to that of victim which will flood the victim with replies and overwhelm it

55
Q

Something you know, are and have are 3 possible factors of …

A

Authentication!!!

56
Q

FACT: Meta-directory gathers ness info from multiple sources and stores them in a central dir. A virtual dir can also serve same purpose.

A

n/a

57
Q

Capacity to process info with Memory cards vs Smart cards

A

Memory card = holds info ONLY

Smart card = holds info and process info.

58
Q

Security assertion Mark up language

A

SAML allows the exchange of authentication and authorization data to be shared between security domain. Most used for SSO and a web-based environment

59
Q

What single sign-on technology is based upon symmetric cryptography thus not needing PKI

A

Kerberos

60
Q

Which single sign-on technology is based upon public-key crypto and thus requires PKI

A

Sesame

61
Q

SPML

A

The service provisioning markup language allows company and effaces to pass service request and receive company prevision access to the services of the sending and receiving companies need to befalling XML standard which will allow this type of vendor clarity to take place

62
Q

Security event management software

A

Security event management software allows the network traffic to confute holistically by gathering Log data centrally and analyzing

63
Q

Your organization has become worried about recent attempts to gain unauthorized access to the R&D facility. Therefore, you have been asked to implement a system that will require individuals to present a password and enter a PIN at the security gate before gaining access. What is this type of system called? A. Authorization B. Two-factor authentication C. Authentication D. Three-factor authentication

A

C. Authenticatoin

64
Q

Which style of authentication is not susceptible to a dictionary attack? A. CHAP B. LEAP C. WPA-PSK D. PAP

A

D. PAP

65
Q

Which of the following types of copper cabling is the most secure against eavesdropping and unauthorized access? A. Single-mode fiber B. Multimode fiber C. Category 6 cabling D. 802.11g wireless

A

C. Cat 6 cabling

66
Q

Auditing is considered what method of access control? A. Preventive B. Technical C. Administrative D. Physical

A

C. Administrative

67
Q

Which of the following is not an example of a single sign-on service? A. RADIUS B. Kerberos C. SESAME D. KryptoKnight

A

A. RADIUS

68
Q

Christine, a newly certified CISSP, has offered to help her brother-in-law, Gary, at his small construction business. The business currently has 18 computers configured as a peer-to-peer network. All users are responsible for their own security and can set file and folder privileges as they see fit. Which access control model best describes the configuration at this organization? A. Discretionary B. Mandatory C. Role-based D. Nondiscretionary

A

A. Discretionary

69
Q

You are approached by a junior security officer who wants to know what CVE stands for. What do you tell him? A. Critical Vulnerability and Exploits B. Common Vulnerabilities and Exposures C. Chosen Vulnerabilities and Exploits D. Common Vulnerabilities and Exploits

A

B. Common Vulnerabilities and Exposures

70
Q

Various operating systems such as Windows use what to control access rights and permissions to resources and objects? A. RBAC B. MITM C. ABS D. ACL

A

D. ACL

71
Q

Kerberos has some features that make it a good choice for access control and authentication. One of these items is a ticket. What is a ticket used for? A. A ticket is a block of data that allows users to prove their identity to an authentication server. B. A ticket is a block of data that allows users to prove their identity to a service. C. A ticket is a block of data that allows users to prove their identity to a ticket-granting server. D. A ticket is a block of data that allows users to prove their identity to the Kerberos server.

A

B. A ticket is a block of data that allows users to prove identity to a service.

72
Q

What type of cryptography does SESAME use to distribute keys? A. Public key B. Secret key C. SHA hashing algorithm D. None; it uses clear text.

A

A. Public Key

73
Q

Your coworkers are having a heated discussion about access control models and their differences. To help them move on to more productive endeavors, you offer to answer their question. Specifically, they want to know what the driving force was behind the development of the Biba model. What do you tell them? A. The Biba model addressed the fact that the Bell-LaPadula model would allow a user with a higher security level rating to write to a subject’s information with a higher security level. B. The Biba model addressed the fact that the Bell-LaPadula model would allow a user with a lower security level rating to write to a subject’s information with a higher security level. C. The Biba model addressed the fact that the Clark-Wilson model would allow a user with a lower security level rating to write to a subject’s information with a lower security level. D. The Biba model addressed the fact that the Clark-Wilson model would allow a user with a higher security level rating to write to a subject’s information with a lower security level.

A

B. Biba model addressed the fact that Bell would allow a user with lower sec level to write to sub with higher level.

74
Q

What are three types of Anomaly based ips

A

Statistical, protocol, and traffic

75
Q

Which of the following access control models addresses integrity? A. Brewer Nash B. Biba C. Bell-LaPadula D. PERT

A

b

76
Q

difficulty remembering all their passwords as they complete their daily activities. What would be the best solution? A. Lower the passwords’ complexity requirements B. Implement harsher penalties C. Add assisted user reset capabilities D. Use single sign-on

A

d

77
Q

How do you lower type 1 errors on biometric devices? A. By increasing type 2 errors B. By decreasing type 2 errors C. By increasing precision D. By decreasing CER

A

a

78
Q

A Privilege Attribute Certificate (PAC) is a component of SESAME and acts as the ticket similar to Kerberos.

A

True

79
Q

is the best way to store passwords? A. In a one-way encrypted file B. Using symmetric encryption C. Using asymmetric encryption D. By means of a digital signature

A

a

80
Q

Which of the following best describes a Zephyr chart? A. A means of establishing the accuracy of a biometric systems B. A means of comparing different biometric systems C. A means of comparing type II and type III authentication systems D. A chart used to examine the accuracy of IDSs and IPSs

A

b

81
Q

Being asked what your maiden name is, what city you were born in, and what your pet’s name is is an example of what? A. Single sign-on (SSO) B. Self-service password reset C. Centralized authentication D. Assisted passwords

A

b

82
Q

Nondiscretionary access control includes which of the following? A. Role- and task-based B. Rule-based and mandatory C. Labeled and mandatory D. None of the above, because there are no subcategories

A

a

83
Q

Which of the following best describes a federated identity? A. Simply another term for SSO B. It is restricted to use within a specific domain or area of the network. C. Type I authentication (something you know) D. It is portable and can be used across business boundaries.

A

d

84
Q

What is a trust? A. A one-way-only bridge established between two domains B. A two-way-only bridge established between two domains C. A security bridge that is established after a valid authentication D. A security bridge that is established between two domains

A

d

85
Q

Which biometric system examines the colored portion of the eye that surrounds the pupil? A. Iris B. Retina C. Fovea D. Optic disk

A

a

86
Q

The Privilege Attribute Certificate (PAC) is a component of what? A. TACACS B. Kerberos C. RADIUS D. SESAME

A

d

87
Q

Triple model to ensure info INTEGRITY with enforcement of rules and certification rules. “seperation of duties”. Relies on auditing to ensure accountability. What access ctl model/theory?

A

Clark-Wilson

88
Q

What access ctl model/theory focuses on INTEGRITY via secure creation/del of subj & obj

A

goguen-meseguer and sutherland

89
Q

A system to require a passowrd and pin at the gate before being granted access is what type of system? A. Authorization, B. 2 factor Authorization, C. Authentication, D. 3-factor Authentication

A

C. Authentication

90
Q

Which biometric system examines the colored poriton of the eye that surrounds the pupil???

A

This Iris is the colored portion of the eye.

91
Q

Provide the formula to calculate Anualized Loss Expected?

A

ALE = SLE (or AV x EF) multiplied by ARO

92
Q

Define Delphi technique

A

an anonymous feedback and response process used to arive at a concensus.

93
Q

Trusted Computer System Evaluation Criteria (TCSEC) is DoD std for computer security requirements. The TCSEC was used to evaluate, classify and select computer systems being considered for the processing, storage and retrieval of sensitive or classified information. What color book in the rainbow series?

A

ORANGE

94
Q

What are the levels of TCSEC and what do they represent?

A

The TCSEC defines four divisions: D, C, B and A where division A has the highest security. D= minimal protections C= discretionary protection B= mandatory protection A= verified protection

95
Q

Threat Events

A

Threat events are accidental or intentional exploitations of vulnerabilities.

96
Q

Documentation Reviews

A

A portion of the documentation review is the logical and practical investigation of business processes and organizational policies.

97
Q

You’ve performed a basic quantitative risk analysis on a specific threat/vulnerability/risk relation. You select a possible countermeasure. When performing the calculations again, which of the following factors will change? a: exposure factor b: single loss expectancy c: asset value d: ARO

A

D: ARO. A countermeasure directly affects the annualized rate of occurrence, primarily because the countermeasure is designed to prevent the occurrence of the risk, thus reducing its frequency per year.

98
Q

Which of the following is a primary purpose of an exit interview?

A

To review NDA

99
Q

What is the primary goal of access control?

A

Access control mechanisms help to prevent losses, including any loss of confidentiality, loss of availability, or loss of integrity. Subjects authenticate on a system and objects are accessed. A first step in access control is the identification and authentication of subjects, but access control also includes authorization and accountability.

100
Q

What type of access controls are hardware or software mechanisms used tomanage access to resources and systems and to provide protection for those resources and systems? A. Administrative B. Logical/techinal C. Physical

A

Logical/technical access controls are the hardware or software mechanisms used to manage access to resources and systems and to provide protection for those resources and systems. Administrative controls are managerial controls and physical controls use physical items to control physical access. A preventive control attempts to prevent security incidents.

101
Q

All of the following are needed for system accountability except for one. Which one is not needed? A. ID B. Authentication C. Auditing D. Authorization

A

Authorization!

102
Q

What is an ACL based on? A: An Obj B: A Subj C: A Role

A

Answer is A An ACL is based on an object and includes a list of subjects that are granted access. A capability table is focused on a subject and includes a list of objects the subject can access. Roles and accounts are examples of subjects and may be included in an ACL, but they aren’t the focus.

103
Q

Which is not used to support single sign on? A: Kerberos B: Federated Identity Mgmt Sys C: TACACS+ D: SPML

A

TACACS+ is a centralized authentication service used for remote access clients but not for single sign-on. Kerberos and federated identity management systems are used to support single sign-on. Service Provisioning Markup Language (SPML) is a language used with some federated identity systems.

104
Q

Which of the following is the best hoice to support federated id mgmt sys? A: Kerberos B: HTML C: XML (extensible markup lang) D: SPML

A

SPML is an XML-based framework used to exchange user information for single sign-on (SSO) between organizations within a federated identity management system. Kerberos supports SSO in a single organization, not a federation. HTML only describes how data is displayed. XML could be used, but it would require redefining tags already defined in SPML.

105
Q

What is a passive, noninvasive attack to observe the operation of a device. Methods include power monitoring, timing, and fault analysis attacks.

A

A side-channel attack

106
Q

Define Whaling

A

Whaling is a type of phishing attack that targets high-level executives.

107
Q

Clipping

A

Clipping is a form of nonstatistical sampling that reduces the amount of logged data based on a clipping-level threshold

108
Q

Remember: Audit trails are a passive form of detective security control. Administrative controls are management practices. Corrective controls can correct problems related to an incident, and Physical controls are controls that you can physically touch.

A

..

109
Q

Which of the following is the least resistant to EMI? A; Thinnet B: 10Base-T UTP C: 10Base5 D: Coaxial cable

A

10Base-T UTP is the least resistant to EMI because it is unshielded. Thinnet (10Base2) and thicknet (10Base5) are each a type of coaxial cable, which is shielded against EMI.

110
Q

Which of the following is not an example of network segmentation? A: Intranet B: DMZ C: Extranet D: VPN

A

A VPN is a secure tunnel used to establish connections across a potentially insecure intermediary network. Intranet, extranet, and DMZ are examples of network segmentation.

111
Q

What is a TCP wrapper?

A

A TCP wrapper is an application that can serve as a basic firewall by restricting access based on user IDs or system IDs.

112
Q

Fact: Stateful inspection firewalls are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities. Stateful inspection AKA 3rd Gen Firewalls

A

..

113
Q

switches are smart

A

A switch is an intelligent hub. It is considered to be intelligent because it knows the addresses of the systems connected on each outbound port.