Chapter 8-10: Access Control, Securing Hosts, Data and Specialized Systems Flashcards

1
Q

In which access control method does the owner of each controlled object decide who can access it and what permissions they have. It is common in Windows and Unix-like operating systems.

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In which access control method do administrators assign security classifications, or labels, to each user and each resource. A user can only access a given resource if their labels are compatible.

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In which access control method is access determined by a set of rules configured by administrators. These can be static or dynamic and may be triggered by other events.

A

Rule-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which access control method is similar to MAC in that administrators define permissions, but instead of clearance levels, users are assigned to one or more roles?

A

Role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which access control mode applies security attributes to resources, users, and environments, then defines policies governing combinations of those attributes?

A

Attribute-based access control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In DAC on Unix, what 3 numbers represent read, write and execute?

A

4 - Read
2 - Write
1 - Execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which form of malware attaches malicious code to another file, which both can do direct damage and spread itself to other running programs

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which form of virus can spread multiple ways and infect multiple types of files

A

Multipartite Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which form of malware spreads itself by exploiting system vulnerabilities?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which form of malware is a compromised or malicious website designed to spread malware to its visitors? Some contain malicious scripts that exploit vulnerabilities in browsers or in plugins.

A

Drive-by-download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which form of malware is a more sophisticated two-stage attack which is related to the drive-by download but targets a specific group or category of users?

A

Watering hole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which payload is a hidden way into a system or application that bypasses standard authentication procedures?

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which payload invisibly installs a remote access program an attacker can later use to access the computer?

A

Remote Access Trojan (RAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which payload is a more advanced form of backdoor which uses automated processes to establish and maintain remote control of an infected system?

A

Command and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which technology allows centralized management of mobile device security settings, software updates, performance tracking and troubleshooting?

A

Mobile device management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which mobile technology allows provisioning and access control for approved enterprise apps, whether commercial or developed in-house

A

Mobile application management (MAM)

17
Q

Which mobile technology delivers centrally hosted data and services to mobile devices, allowing device-specific formatting and security controls.

A

Mobile content management (MCM)

18
Q

Which mobile technology centrally manages identity and access management for mobile devices?

A

Mobile identity management (MIM)

19
Q

Which mobile technology is an evolution of MDM incorporating MAM, MCM, and MIM?

A

Enterprise mobility management (EMM)

20
Q

Which mobile technology is a further evolution of EMM that provides central management of all endpoints from a single platform?

A

Unified endpoint management (UEM)

21
Q

Which embedded system is an integrated circuit with a logical structure that can be reprogrammed after manufacture?

A

Field-Programmable gate array (FPGA)

22
Q

Which system is used to monitor and control industrial systems?

A

Industrial control systems (ICS) aka: process control systems (PCS)

23
Q

Which ICS is used to monitor state changes in large scale distribution systems

A

Supervisory Control and Data Acquisition (SCADA)

24
Q

Which ICS was designed to extend PCS in refineries and other industrial plants while remaining within the confines of a single operation?

A

Distributed Control System (DCS)

25
Q

Which storage technology gives external clients file-level access to storage, but not block-level?

A

Network Attached Storage (NAS)

26
Q

Which storage technology is an array of devices on the network. It is different than a NAS because its controlling hardware gives block-level access to network hosts and protects file systems from simultaneous access by multiple hosts.

A

Storage Area Network (SAN)

27
Q

Which mobile security technique enforces application permissions and prevents rogue applications from affecting the rest of the device.

A

Application Sandboxing

28
Q

Which mobile security technique goes beyond ordinary sand-boxing by creating encrypted containers for specific applications?

A

Containerization

29
Q

Referencing the file permissions below
drwxrwx—+ 2 accounting accounting 18 Jan 8 17:51
what time of access control is being employed here?

A

FACL

30
Q

Targeted attacks and advanced persistent threats cannot be prevented through anti-virus solutions alone. This solution provides centrally managed security solutions that protect endpoints such as servers, workstations, and mobile devices used to connect to enterprise networks. It can be used to prevent zero day exploits, attacks and data leakage on workstations .

A

Endpoint security/protection

31
Q

This is a hierarchical infrastructure that allows a network administrator in charge of Microsoft’s Active Directory to implement specific configurations for users and computers. It can also be used to define user, security and networking policies at the machine level.

A

Group Policy

32
Q

Regarding data ownership, who is the person in the organization with ultimate responsibility for keeping data safe and complying with applicable regulations

A

Data owner

33
Q

Regarding data ownership, who is a system administrator responsible for creating and enforcing the technical controls regarding access to data,
under the direction of its owner.

A

Data custodian

34
Q

Regarding data ownership, who is a person responsible for data management from a business and stakeholder perspective. They ensure that data quality meets business needs, that it has sufficient metadata to make it easy to use, and that it meets all regulatory
requirements.

A

Data steward

35
Q

Regarding Data Ownership under the GDPR, who is an executive who oversees the development, implementation, and enforcement of privacy
policies regarding personal data. Other regulatory frameworks might call the same role a privacy officer.

A

Data Protection Officer (DPO)

36
Q

What is is a framework of policies and technologies for ensuring that the right users (in an enterprise) have the appropriate access to technology resources. Also known as Identity management (IdM).

A

identity and access management (IAM)

37
Q

In mandatory access control, who controls access to resources?

A

Administrators

38
Q

data exfiltration, GPS tracking, and audio eavesdropping are all risks in connecting to what?

A

A malicious USB cable