Domain 3 Flashcards
Access Control Concepts
Which of the following is an example of security control?
Firewall
Subject definition
any entity that requests
access to asset. May be a user, program, etc., is active in initiating the request for services, and should have some level of clearance
Object definition
an entity that responds to a request for service. May be a building, file, etc., provides service to a user, is passive in the request, do not have their own access control logic, and may have a classification
an instruction developed to allow or deny access to an object by comparing the validated identity of the subject to an access control list
Rules
What is the definition of an object in the context of access controls?
An entity that responds to a request for service
Derrick logs on to a system to read a file.
In this example, Derrick is the ______.
Subject
Which of the following is a subject?
User
What is the strategy that integrates people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of an organization?
Layered Defense
How does privileged access management implement the principle of least privilege?
By granting each user access only to the items they need
Physical access controls are
tangible methods or mechanisms that
limit someone from getting access to an
area or asset
Logical access controls are
electronic methods that limit someone
from getting access to systems, and
sometimes even to tangible assets or areas, including passwords, biometrics, etc.
Which of the following is an example of a logical access control method?
Biometrics on a smartphone
Limiting access to data on the network would be considered which of the following controls?
Logical or technical controls
A control serves to
reduce the risk
according to where it falls within
the risk tolerance of the individual
or organization
What would be considered an administrative control in the context of seat belt usage?
Passing a law requiring seat belt use
What would be considered a physical control in the context of seat belt usage?
The seat belt itself would be considered a physical control
What alternative control could be used if biometric locks on multiple doors are not necessary and access does not need to be audited?
Replacing doors with deadbolt locks
In what type of environment does role-based access control work well?
High-staff turnover and similar access requirements
Role-based access control provides
each worker
privileges based on what role
they have in the organization
What term is used to describe the situation where someone inherits expanded permissions that are not appropriate for their role in Role-based Access Control (RBAC)?
Privilege creep
What is the key feature of just-in-time privileged access management?
Role-based subsets of privileges
Privileged accounts are
those with
permissions beyond those of normal users,
such as managers and administrators
In Mandatory Access Control (MAC), what determines the level of access to certain areas in certain government agencies?
Government policy and security clearance
With Mandatory Access Control, who
assigns access rights or permissions?
security administrators
With Discretionary Access Control, who
assigns access rights or permissions?
the object owner
Who can modify security rules in a system governed by Mandatory Access Control (MAC)?
Trusted subjects designated as security administrators
Which of these combinations of physical security controls share a single point of failure?
High-illumination lighting and cameras
A power failure will disable both the cameras and the lights.