Access Control Flashcards

1
Q

A type of access control where the owner of a resource decides who can access it and what permissions they have, often based on user identity.

Example: A file owner grants read and write access to specific users on a shared document.

A

DAC (Discretionary Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An access control model that grants or denies access based on attributes associated with users, resources, and the environment, such as time, location, or roles. This provides fine-grained access control.

Example: A policy allows access to a file only if the user is in the HR department and accessing it during business hours.

A

ABAC (Attribute-Based Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An access control model that assigns permissions based on the roles of users within an organization, simplifying access management by grouping users under specific roles.

Example: An employee assigned to the “Manager” role automatically gets access to all resources designated for managers.

A

RBAC (Role-Based Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A strict access control model where system-enforced policies determine who can access resources, often based on classifications like security labels or user clearance.

Example: In a military system, files are labeled with classifications (e.g., Top Secret), and only users with the appropriate clearance can access them.

A

MAC (Mandatory Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A feature of Windows that allows users to encrypt individual files or folders to protect data from unauthorized access.

A

EFS (Encrypting File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A list that specifies the permissions granted to users and groups for accessing specific files or directories on a system.

A

FACL (File Access Control List)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security technique used to monitor and detect unauthorized changes to files and directories by comparing their current state to a known good baseline.

A

FIM (File Integrity Monitoring)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A file system used by Windows operating systems that supports large file sizes, file permissions, encryption, and other advanced features.

A

NTFS (New Technology File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A policy that ensures equitable distribution of resources, typically in network management, by preventing overuse or abuse by any single user or group.

Example: A company implements a fair access policy to limit bandwidth consumption for high-demand users, ensuring all employees have adequate network resources.

A

Fair Access Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security principle where any access that is not explicitly granted is automatically denied, providing a default security stance of restriction.

Example: In a firewall configuration, all incoming traffic is blocked by default unless explicitly allowed through the firewall rules.

A

Implicit Deny Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A trust relationship in a network where if system A trusts system B, and system B trusts system C, then system A can also trust system C.

Example: If an organization’s domain trusts another domain, and that domain trusts a third domain, users in the third domain can access resources in the first domain.

A

Transitive Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An authentication method that considers the context of a user’s login attempt, such as location, time, or device, to determine whether to grant access.

Example: A user is required to provide additional authentication if they log in from an unrecognized device or location.

A

Context-Aware Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hardware authentication token
Typically, a physical USB stick or key fob-sized device
Primarily used for digital security (2FA/MFA)

A

Security Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly