Access Control Flashcards

(33 cards)

1
Q

Access control methodology that only uses access control lists to maintain subject permissions for objects:

A

Discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the least reliable value for logical access control to use?

A

Physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is best paired with a password to provide improved security?

A

A biometric factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What AC methodology only uses ACL’s to maintain subject permissions for subjects

A

Discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the access control method where the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object.

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is best paired with a password to provide more secure authentication?

A

A biometric factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What would be the least reliable value for a logical access control to use?

A

Physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why would someone be opposed to Biometric Authentication?

A

Biometric authentication can reveal PII and medical information about a person (especially when using the iris and retinal patterns)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the CIA triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What function of the CIA triad does Hashing provide?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What function of the CIA triad does Cryptography provide?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What function of the CIA triad does Authentication provide?

A

Availability (to only the right people, ideally)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What authentication service grants access through tickets?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What AC model enforces permissions based on data labels?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What authentication service uses the X.500 spec?

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three most effective authentication factors?

A

Something you are, Something you know, Something you have

17
Q

What is Role Based Access Control?

A

A list of user roles matched with the levels of access they require to perform their function (often in a matrix)

18
Q

What does RADIUS stand for?

A

Remote Authentication Dial-In User Service

19
Q

What is Diameter?

A

A more powerful version of RADIUS (not backwards compatible) with much greater capability notably the use of Extensible Authentication Protocol.

20
Q

What is Role Based Access Control?

A

A list of rules defining user roles and the levels of access they require to perform their function

21
Q

What is need-to-know ideology?

A

If a person has sufficient privilege to view information but does not require that information for the execution of their duties, then they do not get access.

22
Q

List three Type 2 authentication inputs

A

Common Access Card (CAC), RFID Card, Token

23
Q

What is the benefit of De-centralized Access control?

A

Policy is easily adjusted to local laws and requirements

24
Q

What is summary of the Bell-La Padula Security model?

A

3 Rules

  • Simple: read access no read above your level
  • *: write access up, not down
  • strong *: no read/write
25
What complexity constitutes a "strong" password?
8 characters minimum, with at least one of uppercase, lowercase, numbers and special characters.
26
What principle should prevent any one person from performing multiple job functions that may allow them to commit fraud?
Separation of duties
27
What type of password must be regenerated each time a user logs in?
One-time password
28
What constitutes a strong password?
8 characters minimum, with at least one of uppercase, lowercase, numbers and special characters.
29
If a contractor has an account (e-mail or login) within your organization, when should her access expire?
The day her contract expires.
30
Why should an organization require administrators to disable user accounts of ex-employees?
To ensure that user keys are retained.
31
What it is it an example of if you are required to use a thumbprint scan and PIN to gain access to a system?
Dual-factor authentication
32
What type of authentication stores credentials in a central database and allows them to access multiple systems after logging on only one time?
Single Sign-on
33
Who is ultimately responsible for the Information Security of an organization?
The data owner (CEO, Executive Director, etc.)