Chapter 5: Identity and Access Management Part 2 - Section A Flashcards

1
Q

Introduction: access control is often based on

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Introduction: Computer access can be set for various levels (T or F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Introduction: Access restrictions at the file level generally include what?

A
  1. Read, Inquiry, Copy
  2. Write, create, update, or delete only
  3. Execute only
  4. Combination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Introduction: What is the least dangerous type of access?

A

Read only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

logical access controls mechanisms use what?

A

access control lists or access authorization tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access Control Lists: it refers to a register of?

A
  1. Users
  2. Access permitted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Control Lists: users also include groups and machine process (T or F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access Control Lists: Advanced ACLS access can be at the discretion of which 2 individuals and implemented by who?

A
  1. Policy Makers or User
  2. Security administrator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access Control Lists: When users change jobs, their old access is often removed (T or F)

A

False. It is often NOT removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logical Access Security Administration: In a client-server environment I&A and authorization process can be administered in what ways?

A

Centralized and Decentralized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Logical Access Security Administration: Advantages of conducing security in a decentralized environment include

  1. Security Administration is ___ at the ___ location
  2. Security issues are resolved in a ___ manner
  3. Security controls are ____ on a ___ ___ basis
A
  1. onsite; distributed
  2. timely
  3. monitored; more frequent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logical Access Security Administration: The risk associated with distributed responsibility for security administration includes:

  1. ____ ___ might be implemented rather than those required by the organization
  2. levels of security management might be ___ what can be maintained by a ___ ____
  3. ___ ___ and __ that are often provided by central admin to ensure standards are maintained might be ____
A
  1. Local Standards
  2. below; central admin
  3. Management checks and audits; unavailable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logical Access Security Administration: There are many ways to control remote and distributed sites such as

  1. ______ over access to the computer, data files and remote access to the network should
    be implemented.
  2. The physical control environment should be as secure as possible, with additions, such as ____ ____ and a ___ ___ __
  3. Access from _____ locations via modems and laptops to other
    microcomputers should be controlled appropriately
  4. Opportunities for ___ ____ to gain ____ of the system should be limited by
    implementing controls over access to ___ ___ ___ ___.
  5. Controls should exist for data transmitted from __ ___
  6. When replicated files exist at multiple locations, controls should ensure that all files used are
    ___ and ____ and, when data are used to produce financial information, that no ____
    arises.
A
  1. lockable terminals; locked computer room.
  2. remote
  3. unauthorized people; knowledge;system documentation and manuals
  4. remote locations
  5. correct and current;duplication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Remote Access Security: Remote access users can connect to their organization’s networks with the same level of functionality
that exists within their office (T or F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote Access Security: What are the protocols used by remote access design?

A
  1. Transmission Control Protocol (TCP/IP)
  2. Systems network architecture (SNA) systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote Access Security: Users uses what to connect to a mainframe based legacy application

A

terminal emulation software

17
Q

Remote Access Security: Support for remote connections include?

A
  1. Point-to-point modem connectivity
  2. Integrated Services Digital Network (ISDN)
  3. Dial-on-demand connectivity
  4. Dedicated lines
18
Q

Common Connectivity Methods for Remote Access: what is the most cost effective approach for remote access and why?

A

TCP/IP uses the internet (public infrastructure) provided by the ISPs which reduce costs.

19
Q

Common Connectivity Methods for Remote Access: To achieve over the internet remote access, what should the organization establish?

A

VPN

20
Q

Common Connectivity Methods for Remote Access: Advantages of VPN include:

A
  1. Ubiquity (Common)
  2. ease of use
  3. cheap
  4. read,inquiry, or copy only access.
21
Q

Common Connectivity Methods for Remote Access: Disadvantages of VPN include:

A
  1. less reliable than dedicated circuits
  2. lack of central authority
  3. difficult to troubleshoot
22
Q

Common Connectivity Methods for Remote Access: VPNs can create holes in your security infrastructure (T or F)

A

True

23
Q

Common Connectivity Methods for Remote Access: What can we employ to alleviate risks from using VPN

A
  1. Intrusion Detection System
  2. Virus Scanners
24
Q

Common Connectivity Methods for Remote Access: What is a good practice for VPNs

A
  1. To terminate all VPNs to the same endpoint in a VPN Concentrator
  2. Do not accept VPNs directed at other parts of the network
25
Q

Common Connectivity Methods for Remote Access: Dial Up lines (modem asynch point to point or ISDN) accesses what of an organization?

A

Network access server (NAS)

26
Q

Common Connectivity Methods for Remote Access: What are the most common protocols for NAS

A

RADIUS - Remote Access Dial In User Service
TACACS - Terminal Access Controller Access Control Systems

27
Q

Common Connectivity Methods for Remote Access: What is the common practice for NAS?

A

Terminate the call after recording the number and calling again after authentication

28
Q

Common Connectivity Methods for Remote Access: NAS procedures can be circumvented through?

A

Call forwarding

29
Q

Common Connectivity Methods for Remote Access: what type of dial up connectivity is least preferred from a security control pov is

A

Remote Access Server

30
Q

Common Connectivity Methods for Remote Access: Advantages of dial-up connectivity:

A
  1. low cost
  2. familiarity
31
Q

Common Connectivity Methods for Remote Access: Disadvantages of Dial-up

A

performance

32
Q

Common Connectivity Methods for Remote Access: The saest remote access method is?

A

Dedicated lines

33
Q

Common Connectivity Methods for Remote Access: Network Access server works in concert with?

A

Firewall and router configuration

34
Q

Common Connectivity Methods for Remote Access: Dedicated lines are mostly used by?

A

branch/regional offices or with business partners

35
Q

Common Connectivity Methods for Remote Access: How would an intruder access the data link?

A

compromise the telecommunication provider

36
Q

Common Connectivity Methods for Remote Access: dedicated lines cost how much when compared to other typical connections

A

2 - 5x

37
Q

Common Connectivity Methods for Remote Access: List all 6 risks of remote access

A
  1. Denial of Service
  2. Malicious third parties
  3. Misconfigured software
  4. misconfigured devices
  5. unsecured host systems
  6. unsecured computers of remote users
38
Q

Common Connectivity Methods for Remote Access: List all 5 controls for remote access

A
  1. Policy and Standards
  2. Proper Authorization
  3. Identification and Authentication
  4. Encryption
  5. System and Network Management