Ch.11 Flashcards
A user or a process functioning on behalf of the user that attempts to access an object is known as the:
Question 1 options:
subject
reference monitor
entity
label
subject
The action that is taken by a subject over an object is called a(n):
Question 2 options:
authorization
access
control
operation
operation
What is the name for a predefined framework that can be used for controlling access, and is embedded into software and hardware?
Question 3 options:
accounting and access model
user control model
access control model
authorization control model
access control model
What access control model below is considered to be the most restrictive access control model, and involves assigning access controls to users strictly according to the custodian?
Question 4 options:
Mandatory Access Control
Role Based Access Control
Discretionary Access Control
Rule Based Access Control
Mandatory Access Control
In a UAC prompt, what color is used to indicate the lowest level of risk?
Question 5 options:
red
gray
yellow
green
gray
Which access control model is considered to be the least restrictive?
Question 6 options:
Role Based Access Control
Mandatory Access Control
Rule Based Access Control
Discretionary Access Control
Discretionary Access Control
Select below the access control model that uses access based on a user’s job function within an organization:
Question 7 options:
Role Based Access Control
Rule Based Access Control
Discretionary Access Control
Mandatory Access Control
Role Based Access Control
Which access control model can dynamically assign roles to subjects based on a set of defined rules?
Question 8 options:
Role Based Access Control
Mandatory Access Control
Rule Based Access Control
Discretionary Access Control
Rule Based Access Control
When using Role Based Access Control (RBAC), permissions are assigned to:
Question 9 options:
Roles
Groups
Labels
Users
Roles
A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as:
Question 10 options:
Separation of duties
Job rotation
Mandatory vacation
Role reversal
Separation of duties
A list that specifies which subjects are allowed to access an object and what operations they can perform on it is referred to as a(n):
Question 11 options:
ACE
DAC
entity
ACL
ACL
User accounts that remain active after an employee has left an organization are referred to as being what type of accounts?
Question 12 options:
Active
Stale
Orphaned
Fragmented
Orphaned
To assist with controlling orphaned and dormant accounts, what can be used to indicate when an account is no longer active?
Question 13 options:
Password expiration
Account expiration
Last login
Account last used
Account expiration
Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?
Question 14 options:
RADIUS
ICMP
FTP
Telnet
RADIUS
During RADIUS authentication, what type of packet includes information such as identification of a specific AP that is sending the packet and the username and password?
Question 15 options:
accounting request
access request
verification request
authentication request
authentication request