CH4 Flashcards

1
Q

The security features that govern how users and processes communicate and interact with systems and resources. The primary function is to protect information from unauthorized access (confidentiality), modification (integrity), or disruption (availability).

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used to identify unique records in a set, such as a username. This is the process of the subject supplying an identifier to the object.

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is how identification is proven to be genuine. The process of the subject supplying verifiable credentials to the object.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Defines how access rights and permissions are granted. The process of assigning authenticated subjects the permission to carry out a specific operation.

A

Authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

States that all users - whether they are individual contributors, managers, directors, or executives - should be granted only the level of privilege they need to do their jobs, and no more.

A

Principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An administrative control that dictates that a single individual should not perform all critical - or privileged-level duties. Important duties must be separated or divided among several individuals within the organization.

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List 4 key concepts of identification.

A

Identities should be unique, nondescriptive, securely issued AND Identities can be location based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 3 categories of factors

A

knowledge (something the user knows), possession (something the user has), inherence (something the user is).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A knowledge-based authentication that requires a user to answer a question based on something familiar to them.

A

cognitive password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

With this type of authentication, a user is asked to provide proof that he owns something specific (security badge, token, smart card, etc.).

A

Authentication by ownership or possession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An authentication method that holds user info within a magnetic strip and relies on a reader to process the info. The user inserts the card into the reader and supplies their PIN.

A

Memory Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Similar to memory card, this has a microprocessor and integrated circuits. The user inserts the card into a reader, enters pin.

A

Smartcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of authentication requires communication over a channel that is distinct from the first factor.

A

Out-of-band authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authenticates a user based on some physical or behavioral characteristic, sometimes referred to as a biometric attribute.

A

Authentication by Characteristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication in which 2 or more factors must be presented.

A

Multi-factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Company acquired by Cisco that has a very popular multifactor authentication solution.

A

Duo Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

With this Duo product, you can configure Trusted Endpoints policies to check the posture of the device that is trying to connect to the network, application, or cloud resources.

A

Duo Beyond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This Duo product provides multifactor authentication access to cloud applications using SAML.

A

Duo Access Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This concept assumes that no system or user will be “trusted” when requesting access to the corporate netowrk, systems, and applicatinos hosted on-prem or in the cloud. You must first verify their trustworthiness before granting access.

A

Zero Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 3 primary authorization models

A

object capability, security labels, and ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Used programmatically and is based on a combination of an unforgeable reference and an operational message.

A

Object Capability

22
Q

Mandatory access controls embedded in object and subject properties. Examples are “confidential, secret, top secret”.

A

Security Labels

23
Q

Used to determine access based on some combination of specific criteria, such as a user ID, group membership, classification, location, address, and date.

A

Access Control List

24
Q

An authorization policy should implement what 2 concepts.

A

Implicit Deny, Need to know

25
Q

Access controls defined by policy that cannot be modified by the information owner. Primarily used in military and government systems.

A

Mandatory Access Control

26
Q

Access controls used in commercial operating systems that are defined by the owner of the object. The object owner builds an ACL that allows or denies access to the object based on the user’s unique identity.

A

Discretionary Access Controls

27
Q

Access controls based on a specific role or function. Administrators grant access rights and permissions to roles. Users are then associated with a single role.

A

RBAC (Role-based Access Control)

28
Q

Access controls based on criteria independent of the user or group account. Commonly used criteria are source/dest address, geo location, time of day.

A

Rule-Based Access Control

29
Q

Logical access control model that controls access to objects by evaluating rules against the attributes of entities (both subject and object), operations, and the environment relevant to a request.

A

Attribute-based Access control

30
Q

A method for implementing various access control models.

A

Access Control Mechanisms

31
Q

List 5 access control mechanisms

A

ACLs, Capability Tables, ACMs (access control matrix), Content-dependent access control, Context-dependent access control.

32
Q

What are the 3 most well-known AAA protocols.

A

Radius, TACACS+, Diameter

33
Q

List some of the advantages of TACACS+ over RADIUS

A

Full payload encrypted with TACACS, granular command authorization with TACACS, Authentication Authorization and accounting performed with separate exchanges, TACACS uses TCP protocol (reliability)

34
Q

IEEE standard that is used to implement port-based access control.

A

802.1x

35
Q

3 main roles of an 802.1x enabled network

A

authentication server, supplicant, authenticator

36
Q

An encapsulation defined in 802.1X that’s used to encapsulate EAP packets to be transmitted from the supplicant to the authenticator.

A

EAPoL

37
Q

An authentication protocol used
between the supplicant and the authentication server to transmit authentication
information.

A

EAP

38
Q

The AAA protocol used for communication between the
authenticator and authentication server.

A

RADIUS or Diameter

39
Q

ACL that implements access control based on
the security group assigned to a user (for example, based on his role within the organization)
and the destination resources.

A

SGACL - security group ACL

40
Q

also called a per-user ACL, is an ACL that can be applied
dynamically to a port.

A

downloadable ACL ( dACL)

41
Q

provides a cross-platform integration capability among security monitoring
applications, threat detection systems, asset management platforms, network policy systems,
and practically any other IT operations platform.

A

pxGrid

42
Q

this functionality allows you to dynamically detect and classify endpoints connected to the network

A

ISE Profiling Services

43
Q

ISE rules that enforce policy after authentication is performed

A

Authorization rules

44
Q

a solution and architecture that provides the ability to perform network
segmentation and enables access controls primarily based on the role of the user (and other
attributes) requesting access to the network.

A

Cisco TrustSec

45
Q

The protocol that allows software-enabled devices to participate in the TrustSec architecture

A

SGT Exchange Protocol (SXP)

46
Q

a set of rules in a security policy that define a series of checks
before an endpoint is granted access to the network

A

posture assessment

47
Q

3 types of agents that can be deployed for posture assessment

A

Temporal Agent, Stealth AnyConnect, AnyConnect

48
Q

a feature that allows a RADIUS server to adjust
an active client session. For instance, ISE can issue the (***) RADIUS attribute to an access
device to force the session to be reauthenticated.

A

Change of Authorization (CoA)

49
Q

a feature that enables ISE to collect threat and vulnerability data from many third-party threat and vulnerability scanners and software. The
purpose of this feature is to allow ISE to have a threat and risk view into the hosts it is
controlling access rights for

A

TC-NAC (Threat-Centric Network Access Control)

50
Q

3 methods of authentication on a switch port

A

802.1X, MAB, WebAuth