Access Control Flashcards

1
Q

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the biggest issue with local implementation of AAA?

A

Local implementation does not scale well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an example of privilege escalation attack?

A

A threat actor performs an access attack and gains the administrator password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principle of least privilege access control model?

A

Users are granted rights on an as-needed approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which objective of secure communications is achieved by encrypting data?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are three access control security services?

A

Authentication, Accounting, and Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which access control model allows users to control access to data as an owner of that data?

A

TACACS+ and RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which two protocols are used to provide server-based AAA authentication?

A

Confidentiality, Availability, and Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of access control applies the strictest access control and is commonly used in military or mission critical applications?

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly