Access Control & Identity Management Flashcards
What is the main drawback of most interesting detection systems?
A large number false alarm scanner curb because of abnormal weather conditions animals or in proper calibration.
Name the five intrusion detection system technologies
- Proximity detector – senses changes in the electromagnetic field that surrounds a small area or object.
- Motion detector – detects motion in a certain area.
- Photoelectric detector – senses changes in light patterns that indicates someone is in the area.
- Infrared detector- senses changes in the heat patterns of an area that indicate the presence of an intruder.
- Sound detector – senses sound and vibration and can detect changes in the noise level in an area.
What is read permissions?
You can read the contents of a file or directory.
What is view permissions?
View the contents of a directory ;users can see that a file exists this they won’t necessarily have permissions to read the contents of that file.
Write permissions?
Create and save a new file or write to an existing file.
Print permissions?
Print a file.
Copy permissions?
Copy a file from one location to another. The write permission would also be required in the destination directory.
Delete permissions?
Delete a file or directory.
Execute permissions?
Execute a program file or script.
Modify permissions?
Modify the attributes of a file or directory.
Move permissions?
Move a file from one location to another. The write permission would be required in the destination directory. The delete permission would be required to remove the file after the move is completed.
Name the three different security roles?
- Group
- User
- Role
What is a man-trap?
A man-trap describes a two tier physical access control method with two physical barriers such as doors between the person and the resource he is trying to access.
What is the difference between a smart card and a proximity reader question
A smart card must be swiped or inserted into a card reader a proximity reader is just passed in front of the card reader
What type of smartcard does DoD use?
DoD uses a common access card [CAC].
What is a mandatory access control model?
MAC is where the OS of the network is in control of access to data.
What is a discretionary access control model?
DAC allows the data owners to specify what users can access certain data.
What is role-based access control?
RBAC allows access to be based on the role the user holds within an organization.
What is Rule-based access control based on?
Rule-based access control is based on ACLs [access control list] else and is not necessarily tied to the identity of a user it provides access rules that are applied to all users in the organization.
Your organization has implemented a self-service password reset system. What does this provide?
(A) Password policy
(B) Certificate reset
(C) Password recovery
C - A self-service password reset system allows users to recover passwords without administrative intervention.
You are defining your overall access control model for the new network. To provide a strong default access policy, you want to make sure that users are given the absolute minimum access rights they need to perform their job function. Which access control principle does this follow? A. Implicit deny. B. Separation of duties C. Least privilege D. Role-based access control
Least privileged concept ensures that a user has only the access rights they need to perform their job functions.
You are creating access control model that will allow you to base specific access policies depending on which network a user is on, and not necessarily the actual identity of the specific user. Which privilege management access control model would you use? A. Rule-based access control B. discretionary access control C. Role-based access control D. Mandatory access control
Rule-based access control is defined with an access control list ACL which specifies a set of rules that must be followed before access is granted.
You must create an access control mechanism for your server and network room, which houses all your organization's servers and primary networking equipment. Which methods would be most secure? A. access list B. smart card access C. ID badge D. video surveillance
Smart card access would provide the most security the server room door will not unlock and unless a user inserts her smartcard and has the proper authorization to enter the room.
You are designing file security for a new file server for your sales department. Each user will have his own private and secure directory, and a shared group directory. Which of the following should be the initial default access level? A. Full access B. Read and write access C. No access D. Only read access
No access – you should use the principle of implicit deny.
You have recently had several laptops stolen after hours when employees have unattended laptops on their desk after they leave work which of the following policy should you implement?
A. Enforce the use of cable locks
B. Make sure users are logged out of laptops before they leave
C. Set a hardware password
D. Lock all unattended laptops in a cabinet after hours
D lock all unattended laptops in the cabinet after hours if they are not going to take them home.
Which of the following best practices discourages corruption by insuring that users do not have the same amount of access and privileges for too long a time? A. least privilege B. separation of duties C. job rotation D. implicit deny
Job rotation ensures greater security as no single employee retains the same amount of access control for a particular area for an extended period of time.
Your company has defined working hours for a call center department. There have been several instances of employees using company resources for downloading Internet content after hours. Which of the following can you implement to improve security?
A. use Mac address filtering
B. set access time restrictions
C. shut down all computers after work hours
D. Implement job rotation
Set access time restrictions, you prevent employees from being able to log in and access the network after working hours are complete.
You have had a rash of hacking instance where weak employee passwords are being hacked through brute force methods and unauthorize users are gaining access to the network. Which security policy should be implemented?
A. password rotation
B. password length and complexity restrictions C. password expiration
D. Limiting logon attempts
Brute force attacks can most efficiently be stop by limiting the number of attempted logons.
You have already implemented a password expiration and rotation policy that forces your users to change their password every 60 days. However you find many users are simply using their same password again what security should you implement? A. password history B password complexity C. limiting logon attempts D. password expiry
Password history-the system can remember a user’s former passwords and when the current user password expires the system forces the user to use a new password that is not the same as the previous passwords.
Military building uses strict access control when where a user must use a smartcard access to enter the main door the facility. Then he must meet a security guard at the second door to present an ID badge and enter his pin number. What security features used in this access mechanism A. mandatory access control B. implicit deny C. three-tier access control D. man trap
D mantrap - a user must be authenticated to be able to enter the first door of a facility. When he has entered the first door, it is closed, and the user is physically trapped between the first and second doors. The user must pass an additional round of authentication to gain access through the second door.
What protocol stores passwords less than 15 characters long as two strings of seven characters after converting all characters to upper case?
LANMAN
What can an organization issue to employees that uses a rolling password for authentication?
RSA token
United States federal agency employees use a specialized type of smart card that includes photo identification and provides confidentiality, integrity, and authentication. What is this?
A personal identity verification (PIV) card.
What is a central authentication system that uses a federated user database?
Single sign-on (SSO)
Where you implement Group Policy for multiple users in a domain?
Domain controller
What remote access protocol is used to authenticate Microsoft clients and includes mutual authentication?
MS-CHAPv2
Compare TACACS+ and RADIUS. Which protocol encrypts the entire authentication process and uses multiple challenges and responses?
TACACS+
Compare TACACS+ and RADIUS. Which protocol uses UDP?
RADIUS
Which access control model uses group based privileges?
Role-based access control (RBAC)