Chapter 14 Flashcards

1
Q

______ refer to the access granted for an object and determine what you can do with it.

a) rights
b) permissions

A

Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____primarily refers to the ability to take an action on an object.

a) rights
b) permissions

A

right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

________ are the combination of rights and privileges.

a) rights
b) permissions
c) Privileges

A

Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An _________ is a table that includes subjects, objects, and assigned privileges.

A

access control matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACLs are focused on ______ and a capability table is focused on ______.

A

objects , subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ ___ ______________ uses multiple

layers or levels of access controls to provide layered security.

A

defense-in-depth strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ allows the owner, creator, or data custodian of an object to control and define access to that object

A

discretionary access controls (DACs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Administrators centrally administer _______and can make changes that affect the entire environment. In contrast, __________ models allow owners to make their own changes, and their changes don’t affect other parts of the environment.

A

nondiscretionary access controls , discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between DAC and role- BAC ?

A

In the DAC model, objects have owners and the owner determines who has access. In the role-BAC model, administrators determine subject privileges and assign appropriate privileges to roles or groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which access control model relies on the use of classifilcation labels ?

A

mandatory access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ___________ relates various classification labels in an ordered structure from low security to medium security to high security, such as Confidential, Secret, and Top Secret, respectively.

A

hierarchical environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _____ is the possibility or likelihood that a threat will exploit a vulnerability resulting in a loss such as harm to an asset.

a) threat
b) risk
c) vulnerability

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ______ is a potential occurrence that can result in an undesirable outcome.

a) threat
b) risk
c) vulnerability

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A _____________ is any type of weakness.
The weakness can be due to a flaw or limitation in hardware or software, or the absence
of a security control such as the absence of antivirus software on a computer.

a) threat
b) risk
c) vulnerability

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___________ refers to the process of identifying,

understanding, and categorizing potential threats.

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name 3 Threat Modeling Approaches

A

Focused on Assets, Focused on Attackers, Focused on Software

17
Q

What is Access aggregation ?

A

Collecting multiple pieces of nonsensitive information and combining (i.e., aggregating) them to learn sensitive information.

18
Q

A ____________ is an attempt to discover passwords by using every possible password
in a predefined database or list of common or expected passwords.

A

dictionary attack

19
Q

A previously used password, but with one character

different is called __________

A

oneupped- constructed password

20
Q

An attempt to discover passwords for user accounts by systematically attempting all possible combinations of letters, numbers, and symbols is called ______________ .

A

brute-force attack

21
Q

What is it called when two separate passwords create the same hash ?

A

Collision

22
Q

What is A birthday attack ?

A

Using a tool to create the same hash value as a password.

23
Q

What type of attack reduces this time by using large

databases of precomputed hashes.

A

rainbow table

24
Q

What is a salt ?

A

a group of random bits, added to a password before hashing it.

25
Q

Capturing packets sent over a network with the intent of analyzing the packets is called what ?

A

Sniffing

26
Q

A form of social engineering that attempts to trick users into giving up sensitive information, opening an attachment, or clicking a link.

A

Phishing