Domain 1 Flashcards
What are the three critical areas of security?
a) Authentication, Accreditation, and Authorization
b) Integrity, Confidentiality, and Availability
c) Confidentiality, Integrity, and Authentication
d) Non-repudiation, Availability, and Integrity
Integrity, Confidentiality, and Availability
Which of the following critical areas of security represents the unauthorized modification of information?
a) Confidentiality
b) Repudiation
c) Authorization
d) Integrity
Integrity
Which formula below accurately represents the equation for calculating the risk associated with your critical assets?
a) Risk = Vulnerability x Likelihood
b) Threat = Risk x Vulnerability
c) Risk = Threat x Vulnerability
d) Vulnerability = Threat x Risk
Risk = Threat x Vulnerability
Of the four core principles of network security, which one relates to understanding which services are running on your system?
a) Defense-in-Depth
b) Principle of Least Privilege
c) Prevention is Ideal but Detection is a Must
d) Know Thy System
Know Thy System
Giving Bob, the accountant, access only to the Accounting application required for his duties is an example of which core security principle?
a) Defense-in-Depth
b) Principle of Least Privilege
c) Know Thy User
d) Know Thy System
Principle of Least Privilege
Which principle is represented by an accountant creating a company’s books and an auditor reviewing the books for accuracy?
a) Separation of Duties
b) Principle of Least Privilege
c) Job Rotation
d) Know Thy System
Separation of Duties
Which access control measure method would be affected by an inaccessible system administrator?
a) Preventive
b) Suggestive
c) Incentive
d) Detective
Detective
Which of the following concepts relates most closely to the Principle of Least Privilege?
a) Authentication
b) Identity
c) Detection
d) Separation of Duties
Separation of Duties
If Dan, a user with level three clearance, attempts to read a document requiring a level four clearance, he is violating which of the following access control techniques?
a) The Star Property of the Bell-LaPadula Model
b) The Simple Security Property of the Bell-LaPadula Model
c) The Simple Integrity Property of the Biba Model
d) The Super Simple Star Property of Biba Model
The Simple Security Property of the Bell-LaPadula Model
Which of the following access control techniques requires the user to follow a procedure to access protected data?
a) The Clark-Wilson model
b) The Biba model
c) The Middleman model
d) The Bell-LaPadula model
The Clark-Wilson model
Which of the following characteristics makes the BIBA model the opposite of the Bell LaPadula (BLP) model?
a) No write down and no read up
b) Read up but no write down
c) No read down and no write up
d) Write down but no read up
No read down and no write up
In the process of employee termination, which access management activity most effectively controls access?
a) Account administration
b) Account maintenance
c) Account monitoring
d) Account revocation
Account revocation
Of the four ways a user can be authenticated, which presents the use of physical human attributes in the process?
a) Something you are
b) Something you have
c) Something you know
d) Something you share
Something you are
If you had a classified system located in the middle of the desert, which authentication method would serve best?
a) Something you have
b) Something you know and are
c) Something you share
d) Someplace you are
Someplace you are
What is the MOST influential factor in determining if a biometric solution is feasible for a system?
a) System size
b) Usability
c) Criticality
d) Cost
Cost