Cissp - Access Control Flashcards
A passive data file
Object
An active entity on an information system
Subject
Gives subjects full control of objects they have been given access to, including sharing the objects with other subjects.
Discretionary access control - DAC
System enforced access control based on subject’s clearances and objects labels.
Mandatory access control - MAC
Subjects are grouped into roles and each defined role has access permissions based on the role not the individual .
Role based access control - RBAC
The mission and purpose of access control is to:
Protect the confidentiality, integrity, and availability of data.
- What type of password cracking attack will always be successful?
Brute Force
- What is the difference between password cracking and password guessing?
Password guessing attempts to log into the system, password cracking attempts to determine a password used to create a hash.
- The most insidious part of phishing and spear phishing attacks come from which part of the attack anatomy.
Phishing and spear phishing attacks are rarely successful.
- What is the term used for describing when an attacker, through a command and control network, controls hundreds, thousands, or even tens of thousands of computers to perform actions all at once?
Botnets
- What are the main differences between retina scans and iris scans?
Iris scans invade a person’s privacy and retina scans to not.
- What is the most important decision an organization needs to make when implementing RBAC?
The roles users have on the system need to be clearly defined..
- What access control method weighs additional factors such as time of attempted access before granting access?
Context-dependent access control.
- An attacker sees a building is protected by security guards and attacks a building next door with no guards. What control combination are the security guards.
Physical/deterrent
- A Type II biometric is also known as what?
False accept rate (FAR)
- Within Kerberos, which part is the single point of failure?
Key distribution center
- Your company has hired a third-party company to conduct a penetration test. Your CIO would like to know if exploitation of critical business systems is possible. The two requirements the company has are:
- The tests will be conducted on live, business functional networks. Thes networks must be functional in order for business to run and cannot be shut down, even for an evaluation.
- The company wants the most indepth test possible.
What kind of test should be recommended?
Full knowledge
- Your company has hired a third-party company to conduct a penetration test. Your CIO would like to know if exploitation of critical business systems is possible. The two requirements the company has are:
- The tests will be conducted on live, business functional networks. Thes networks must be functional in order for business to run and cannot be shut down, even for an evaluation.
- The company wants the most indepth test possible.
While conducting the penetration test, the tester discovers that a crical business system is currently compromised. What should the tester do?
Immediately end the penetration test and call the CIO.
- What group launches the most attacks?
Outsiders
- A policy stating that a user must have a business requirement to view data before attempting to do so is an example of enforcing what?
Need to know.
- What technique would raise the false accept rate (FAR) and lower the false reject rate (FRR) in a fingerprint scanning system?
Decrease the amount of minutiae that is verified.
CIA stands for
Confidentiality, integrity, and availability
What do access controls protect against.
Unauthorized access, inappropriate modification of data, and loss of confidentiality of data
What are the opposing forces in CIA
.
Disclosure, Alteration, and Destruction
What is PII
Personally identifiable information