Access Control Flashcards

1
Q

Name three types of access controls.

A

Administrative, Technical and Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name an Administrative Control

A

Policy, Training, Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name a Technical Control

A

What you find on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name a physical control

A

Doors, Locks, Guards, Dogs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name control types in order

A

Preventive, deterrent, corrective, detective, recover, compensating and directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name Authentication Components

A

Biometrics, Passwords, Token Devices, Memory Cards, Smart Cards, Cryptographic Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Discretionary Access Control (DAC)

A

dddd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the components of the CIA Triad

A

Confidentiality, Integrity, Availablity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a table of Subjects, Objects and permissible actions?

A

Access Control Matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are small credit size items used for entry access sometimes shaped like a calculator?

A

Tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A series of numbers, used in confidentially by a user to verify their identity is?

A

PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of attack is most effective against passwords?

A

Brute-Force and Dictionary Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which model give complete control of data, based on the level of access given to a specific user?

A

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access control is classified as which kind of Mechanism

A

Preventive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The first step in any access control is?

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What authentication system requires two factors out of three, it is said to be using?

A

Two-Factor Authentication

17
Q

What is the best way to destroy data?

A

Degauss then destroy

18
Q

What is an active entity that request access to an object or data

A

Subject

19
Q

What is a passive entity that contains info or data?

A

Oject

20
Q

What is the ability of a subject to do something such as read, write, create, execute?

A

Access

21
Q

What is a security feature that controls how subjects objects interact with each other?

A

Access Control

22
Q

What grants access to resources based on a criteria list

A

Authorization

23
Q

What is the requirement of having two of the three factors of authentication?

A

Strong Authentication (Two-Factor)

24
Q

What happens when a user or administrator has more privileges than they need for the security of the system

A

Excessive Privelege

25
Q

What is the basic authentication process?

A

Identification (Something you know - Password)
Authentication (Something you are - Biometrics)
Authorization (Something you physically have - Cards

26
Q

What is a secret value in possession by one person?

A

A Private Key

27
Q

What does one use to prove one’s identity?

A

A private key or digital signature

28
Q

What is a digital signature?

A

encrypting a hash value with the private key

29
Q

What is more secure than passwords?

A

Digital Signatures

30
Q

What is a sequence characters that when typed software transforms them into a virtual password

A

Passphrases