Ch 12 Key Terms Flashcards

1
Q

validate credentials as genuine

authentication

authorization

accounting

identification

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a hierarchy based on the labels; i.e. top secret has a higher level than secret

levels

RBAC

DAC

labels

A

levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

provide file system security for protecting files managed by the OS

kerberos

LDAP

ACL

Radius

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the process of recognizing and distinguishing the user from any other user

authorization

authentication

identification

accounting

A

identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

most restrictive access control; user has no freedom to set any controls or distribute access

RBAC

ABAC

MAC

DAC

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

right given to access specific resources

access

authorization

identification

authentication

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

an opportunity to audit employees’ activities while they are on vacation

separation of duties

job rotations

mandatory vacations

Permission auditing and review

A

mandatory vacations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the process of periodically revalidating a user’s account, access control and membership role

separation of duties

mandatory vacations

Permission auditing and review

recertification

A

recertification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

using MAC model, every entity is an object and is assigned a classification label

labels

levels

DAC

RBAC

A

labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

individuals are periodically moved from one job responsibility to another

separation of duties

job rotation

mandatory vacations

recertification

A

job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

providing a framework for controlling access to computer resources

AOC

AAA

ACC

AAC

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

granting permission to take an action; permission granted for admittance

accounting

identification

authentication

authorization

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

used for connecting to remote networks; provides port security (802.1x)

Kerboros

LDAP

Radius

ACL

A

Radius

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

actions to be taken when an employee leaves an enterprise

least privilege

employee offboarding

employee onboarding

recertification

A

employee offboarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

least restrictive; every object has an owner who has total control over that object

MAC

access control model

RBAC

DAC

A

DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

an authentication system used to verify the identity of networked users

kerberos

LDAP

ACL

Radius

A

kerberos

17
Q

person responsible for the information

privacy officer

owner

user

custodian

A

owner

18
Q

allows a user’s login credentials to be stored with a single identity provider

AD

X.500

Radius

SAML

A

SAML

19
Q

based on user’s job function within an organization

RBAC

DAC

MAC

ABAC

A

RBAC

20
Q

individual to whom day-to-day actions have been assigned by the owner

privacy officer

custodian

owner

user

A

custodian

21
Q

an audit process that looks at the apps that the user is provided and how frequently they are used

recertification

Usage auditing and review

Permission auditing and review

job rotations

A

Usage auditing and review

22
Q

manager who oversees data privacy compliance and manages data risk

owner

privacy officer

user

custodian

A

privacy officer

23
Q

designed to run over TCP/IP; X.500 Lite

ACL

LDAP

Kerboros

Radius

A

LDAP

24
Q

rules that have been established for creating account names

Usage auditing and review

job rotations

Permission auditing and review

standard naming conventions

A

standard naming conventions

25
Q

a record of user actions; to provide an audit trail

authorization

accounting

identification

authentication

A

accounting