Chapter 6 Flashcards
A remote access user needs to gain access to resources on the server. Which of the following processes are performed by the remote access server to control access to resources?
Authentication and accounting
Authentication and authorization
Authorization and accounting
Identity proofing and authorization
Identity proofing and authentication
Authentication and authorization
Audit trails produced by auditing activities are which type of security control?
Detective
Directive
Preventative
Deterrent
Detective
Which of the following is used for identification?
Password
PIN
Username
Cognitive question
Username
You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with?
Principle of least privilege
Cross-training
Need to know
Job rotation
Principle of least privilege
You want to implement an access control list in which only the users you specifically authorize have access to the resource. Anyone not on the list should be prevented from having access.
Which of the following methods of access control should the access list use?
Implicit allow, explicit deny
Explicit allow, implicit deny
Implicit allow, implicit deny
Explicit allow, explicit deny
Explicit allow, implicit deny
Which of the following principles is implemented in a mandatory access control model to determine object access by classification level?
Principle of least privilege
Need to Know
Separation of duties
Ownership
Clearance
Need to Know
Which of the following is an example of privilege escalation?
Separation of duties
Principle of least privilege
Privilege creep
Mandatory vacations
Privilege creep
What is the primary purpose of separation of duties?
Inform managers that they are not trusted
Grant a greater range of control to senior management
Prevent conflicts of interest
Increase the difficulty of performing administrative duties
Prevent conflicts of interest
Which access control model is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject?
Rule-Based Access Control
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Mandatory Access Control (MAC)
Attribute-Based Access Control (ABAC)
You have implemented an access control method that only allows users who are managers to access specific data. Which type of access control model is being used?
RBAC
MAC
DACL
DAC
RBAC
Which of the following is an example of rule-based access control?
A member of the accounting team that is given access to the accounting department documents.
A computer file owner who grants access to the file by adding other users to an access control list.
A subject with a government clearance that allows access to government classification labels of Confidential, Secret, and Top Secret.
Router access control lists that allow or deny traffic based on the characteristics of an IP packet.
Router access control lists that allow or deny traffic based on the characteristics of an IP packet.
Which of the following are examples of Something You Have authentication controls? (Select two.)
Voice recognition
Smart card
Handwriting analysis
Photo ID
PIN
Cognitive question
Smart card
Photo ID
Which of the following identification and authentication factors are often well known or easily discovered by others on the same network or system?
PGP secret key
Password
Username
Biometric reference profile
Username
Which of the following is a password that relates to things that people know, such as a mother’s maiden name or a pet’s name?
Dynamic
One-time
Passphrase
Cognitive
Cognitive
What type of password is maryhadalittlelamb?
Static
Passphrase
Composition
Cognitive
Passphrase
smart card can be used to store all but which of the following items?
Digital signature
Identification codes
Biometric template original
Cryptography keys
Biometric template original
Which of the following are disadvantages of biometrics? (Select two.)
Biometric factors for identical twins are the same.
When used alone, they are no more secure than a strong password.
They can be circumvented using a brute force attack.
They require time synchronization.
They have the potential to produce numerous false negatives.
When used alone, they are no more secure than a strong password.
They have the potential to produce numerous false negatives.
What is the MOST important aspect of a biometric device?
Accuracy
Size of the reference profile
Enrollment time
Throughput
Accuracy
Which of the following defines the crossover error rate for evaluating biometric systems?
The point where the number of false positives matches the number of false negatives in a biometric system.
The number of subjects or authentication attempts that can be validated.
The rate of people who are given access when they should be denied access.
The rate of people who are denied access when they should be allowed access.
The point where the number of false positives matches the number of false negatives in a biometric system.
Which of the following terms is used to describe an event in which a person who should be allowed access is denied access to a system?
False positive
False acceptance
False negative
Error rate
False negative
Which security mechanism uses a unique list that meets the following specifications:
The list is embedded directly in the object itself.
The list defines which subjects have access to certain objects.
The list specifies the level or type of access allowed to certain objects.
Mandatory access control
Hashing
User ACL
Conditional access
User ACL
What is the process of controlling access to resources such as computers, files, or printers called?
Mandatory access control
Conditional access
Authorization
Authentication
Authorization
Which of the following objects identifies a set of users with similar access needs?
SACL
Permissions
Group
DACL
Group
Which of the following identifies the type of access that is allowed or denied for an object?
DACL
SACL
Permissions
User rights
Permissions
Which of the following is used by Microsoft for auditing in order to identify past actions performed by users on an object?
User rights
Permissions
SACL
DACL
SACL
Which type of group can be used for controlling access to objects?
DACL
Distribution
Authorization
Security
Security
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder.
Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do?
Manually refresh Group Policy settings on the file server.
Have Marcus log off and log back in.
Add his user account to the ACL for the shared folder.
Manually refresh Group Policy settings on his computer.
Have Marcus log off and log back in.
Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?
Cookie
Proxy
Account policy
Access token
Access token
Lori Redford, who has been a member of the Project Management group, was recently promoted to manager of the team. She has been added as a member of the Managers group.
Several days after being promoted, Lori needs to have performance reviews with the team she manages. However, she cannot access the performance management system. As a member of the Managers group, she should have the Allow permission to access this system.
What is MOST likely preventing her from accessing this system?
She is still a member of the Project Management group, which has been denied permission to this system. However, being a member of the Managers group should allow her to access this system. Allow permissions always override Deny permissions. There must be an explicit permission entry that is preventing her from accessing the management system.
She is still a member of the Project Management group, which has been denied permission to this system. Deny permissions always override Allow permissions.
Her user object has been assigned an explicit Allow permission to the performance management system, but she inherited the Deny permission assigned to the Project Management group (which she still belongs to). Inherited Deny permissions override explicit Allow permissions.
Her user object has been assigned an explicit Deny permission to the performance management system.
She is still a member of the Project Management group, which has been denied permission to this system. Deny permissions always override Allow permissions.
Which of the following is a privilege or action that can be taken on a system?
Permissions
User rights
SACL
DACL
User Rights
Which of the following account types is a cloud-based identity and access management service that provides access to both internal and external resources?
Domain
Administrator
Microsoft
Azure AD
Azure AD
You are consulting a small startup company that needs to know which kind of Windows computer network model they should implement.
The company intends to start small with only 12 employees, but they plan to double or triple in size within 12 months. The company founders want to make sure they are prepared for growth.
Which networking model should they implement?
Public
Workgroup
Standalone
Wired
Client-server
Wireless
Client-server
Which of the following account types uses a single sign-on system that lets you access Windows, Office 365, Xbox Live, and more?
Domain
Microsoft
Administrator
Azure AD
Microsoft
Mary, a user, is attempting to access her OneDrive from within Windows and is unable to.
Which of the following would be the MOST likely cause?
Mary has a local administrator account.
Mary needs to connect to Azure AD.
Mary needs to log in with a Microsoft account.
Mary has a local standard user account.
Mary needs to log in with a Microsoft account.
Which networking model is based on peer-to-peer networking?
Workgroup
None
Client-server
Standalone
Workgroup
You are a contract support specialist managing the computers in a small office. You see that all the computers are only using local user accounts.
Which of the following models could this office be using? (Select two.)
Workgroup
Client-server
Active Directory
Azure AD
Domain
Standalone
Workgroup
Standalone
John, a user, is attempting to install an application but receives an error that he has insufficient privileges. Which of the following is the MOST likely cause?
John has a local standard user account.
John has a local administrator account.
John needs to log in with a Microsoft account.
The application is not a valid Windows application.
John has a local standard user account.