Domain 5 Flashcards

1
Q

__ access control assigns users to groups based on their organizational functions.

A

RBAC (Role-based Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__ aka __ is the percentage at which false rejection and false acceptance are equal. The lower this number, the more accurate the biometric device.

A

CER (Crossover Error Rate) aka EER (Equal Error Rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__ identification is checking to see if you’re in a general category of people e.g. 21 or above for alcohol at a liquor store.

A

Negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__ identification is claiming to be a specific entity and matching up against that entity e.g. Eric boarding a flight.

A

Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__ is a laser scan of blood vessels in the eye and may be seen as intrusive since you need to press up against sensor and it can provide information concerning illness.

A

Retina pattern. ‘R’ is red, blood is red

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__ is a passive scan of the eye. It is non-instrusive and can be scanned within a few feet.

A

Iris scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__ is a trusted third-party scheme that uses tickets to allow a user to log on to a system once and use any available services without re-authenticating to many different servers.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

__ is an authentication type that is accomplished through some form of token and is more expensive to implement since each user needs a token.

A

Something you have e.g. token, access card, cookie, magic stones. Could be stolen from adversary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

__ is an easy type of authentication to implement however it’s also easy for an attacker to guess e.g. a password / PIN.

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

__ is an SSO authentication protocol invented at MIT.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__ is based on what object the subject is trying to access and the events preceding the access attempt e.g. a user might be limited to 100 connections a day, after 100 she will be denied access. Or there is a quota where the user can access the resource as long as her data limited is not exceeded.

A

Content-Dependent Access Control aka Context-based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__ is SSO that uses symmetric and asymmetric encryption.

A

SESAME (Secure European System for Applications in a Multi-Vendor Environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__ is SSO for the cloud, sometimes also called __.

A

IDaaS (Identity as a Service), Cloud Identity e.g. Microsoft account, formerly Windows Live ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__ is the fluctuations in one’s voice that can uniquely identify the person.

A

Voice print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__ is the part of IAAA that is least privilege, then there is __ when there is too much access for one person, then there is __ to prevent collusion since people become friends over time.

A

authorization, separation of duties, rotation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__ looks at the lines/shapes/depths/widths to come up with a geometric representation.

A

Hand geometry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

__ rate is the percentage of authentic persons rejected as unidentified/unverified. It is a Type __ error.

A

FRR (False Reject Rate), Type 1 error. It’s when a legitimate user is not allowed in. Just upsetting a legit user so think Type I is less than Type II (FAR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

__ rate is the percentage of unenrolled/impostors accepts as authentic.

A

FAR (False Accept Rate), Type 2 error. It’s allowing someone in who shouldn’t be allowed in so think Type II is worse than Type 1 (FRR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

__ targets actions based on rules for subjects operating on objects.

A

RSBAC (Rule Set-Based Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A __ access control system where an administrator or data owner decides whether a user should have access to an object.

A

DAC (Discretionary Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A __ attack on passwords will always work, it is just a matter of time.

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A __ can be better than a password since it makes it easy for the user to remember but difficult for the adversary.

A

Passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A __ is a central trusted credential source for SSO. An example is LDAP.

A

Directory Service, LDAP (Lightweight Directory Access Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A __ is a random number that is hashed along with the password. This makes rainbow tables impractical.

A

salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A __ is always running to make sure a subject’s clearance is equal to or greater than the object’s classification.

A

reference monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A __ is when an owner authenticates himself to the token, then the token authenticates the owner to an information system e.g. having a USB stick in a computer to allow it to boot up

A

Static Password Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A __ offers reasonable tradeoff between complexity and length, offering less entropy per character but more overall entropy due to length.

A

Passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A __ token uses different challenges so responses are different and won’t be subject to a replay attack.

A

Challenge-Response Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A normal password with or without an expiration time that is user-picked or system-generated, and is reusable.

A

Static password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A one-time password or __ password is ideal but also not scalable.

A

Dynamic (one time) password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Acceptable throughput rate is __ users per minute or __ seconds per subject.

A

10 users per minute, 6-10 seconds per subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Account administration is sometimes also known as the __.

A

onboarding process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

AD uses __ as the primary method of authentication.

A

Kerberos

34
Q

An access control system that is not based on labels or at the discretion of an individual is __. A central authority determines the access.

A

Non-Discretionary Access Control is not based on labels (MAC) or discretion of individual (DAC) e.g. role-based, task-based

35
Q

Draw ACM (‘Access Control Matrix - Drawing 4G’) aka capability table

A

e.g. objects across top, subjects down left side; R/W/RW in the cells where they meet. Difficult to scale

36
Q

Draw out how Kerberos works

A

Refer to ‘Kerberos 1 - Quiz 5 Q40’ and ‘Kerberos 2 - D5 pg 40’

37
Q

Examples of this form of authentication are: If you are in a government building you can decrypt data, otherwise you cannot; a bank may check your IP and make you register each time it changes; blocking IP address based on country.

A

Some place you are

38
Q

Federated IdM standard that is a consumer-oriented integration.

A

OpenID, comprised of IdP (Identity Providers which are sources of identity info), RP (Relying Parties, sites that can use identity info from the IDp), Redirect URL (provided by IdP informing RP that subject been successfully authenticated

39
Q

Federated IdM standard that is an enterprise-oriented integration.

A

SAML (Security Assertions Markup Language). Allowing your users to login with their Facebook account. Comprised of SP (Service Provider, apps that can leverage identity/auth assertions from IDP), IDP (Identity Provider, origin of identity that creates assertions accepted by the SP), Assertion Consumer Service (hosted by SP and is where the IDP will send assertions)

40
Q

Fingerprints look at __ on the finger tip.

A

minutiae

41
Q

Palm scans look at __ on the hand.

A

minutiae

42
Q

For Kerberos every time you communicate with a new entity you have a new __ and at any given time only __ parties know the key which is how you do mutual authentication.

A

key pair, 2 parties; one person accessing one server uses 6 different keys

43
Q

For the CIA triad, Kerberos addresses __ and __ but not __.

A

Confidentiality, Integrity but not Availability since there’s only one KDC (single point of failure) which has the secret keys for every entity on the network.

44
Q

How often should a user change their password?

A

Before the time it takes an adversary to break it.

45
Q

Ideally passwords would be managed using an individual password manager or centrally managed via SSO (implemented at corporate level)?

A

Centrally managed

46
Q

If a generated password falls out of sync, this means you are likely using a __ password token.

A

Asynchronous Dynamic Password Token

47
Q

If a system will only allow open enrollment for medical care during a certain period of time what type of access control is this?

A

Temporal (time-based) Isolation which falls under Non-Discretionary Access Control

48
Q

If security is inserted directly into the protocol stack it would be the __ layer(s).

A

Presentation Layer 6

49
Q

If Word runs as a process and reads a configuration file what is the subject and object.

A

Word is the subject, config file is the object

50
Q

If you are using SSO from an untrusted network such as the internet or a high-risk area you must always use __.

A

Two factor authentication. Otherwise someone can get access to everything in your environment

51
Q

In access control model terminology the __ are the filters such as Read, Write and Execute for Unix.. __ are another set of rules with respect to sensitivity.

A

rules, sensitivity

52
Q

In access control model terminology the __ is the active entity (user, process or device) and the __ is the passive entity acted upon (files, directories, pipes, devices, sockets, ports).

A

subject, object

53
Q

In biometric access control, __ is how long it takes to add a new user. The standard is __ seconds per person.

A

Enrollment time, 2 min or 120 sec

54
Q

In biometrics, the __ is the recommend intrusive method. The __ is the recommended non-intrusive method.

A

fingerprint, iris

55
Q

In Kerberos if you have 100 users and 30 servers, how many keys do you have?

A

130 because you have a key for every entity

56
Q

In Kerberos, __ is used for authentication and __ is for authorization.

A

KDC (Key Distribution Center), TGS (Ticket Granting Server)

57
Q

In MAC, applying a label to a subject is called a __. Applying a label to an object is called a __.

A

clearance, classification

58
Q

In RBAC, __ is where users are granted access via ACLs. __ is where user access is mapped to applications. __ is where a user is assigned a role which is assigned access to applications or systems. __ is access controlled by roles and applied to applications and systems. It is determined on job function not application or system.

A

Non-RBAC, Limited RBAC, Hybrid RBAC, Full RBAC

59
Q

In th eprocess of employee termination, which access management activity most effectively controls access?

A

account revocation

60
Q

In the __ access control model every subject and object gets a label and any time the subject tries to access the objects, the __ checks access and either approves or denies it.

A

MAC (Mandatory Access Control), Reference Monitor

61
Q

It is critical that the screensaver locks the screen within __ minutes and does an automatic logoff within __ minutes.

A

5 min, 10 min. Can also have a physical card strapped to the person like a server at a restaurant.

62
Q

Kerberos uses tickets, SESAME uses __.

A

PACs (Privileged Attribute Certificate)

63
Q

__ is SSO that uses symmetric encryption for mutual authentication.

A

Kerberos

64
Q

Revocation in terms of the access provisioning lifecycle is sometimes known as the __.

A

Offboarding process. It includes the removal of access when necessary.

65
Q

SSO across multiple organizations e.g. logging in with Facebook credentials to other sites is called __.

A

Federated IdM (Identity Management)

66
Q

The most trusted entity in Kerberos is the __.

A

KDC (Key Distribution Center)

67
Q

The type of access control standard in most systems is __.

A

DAC (Discretionary Access Control)

68
Q

This type of authentication does not change and can cause privacy concerns.

A

Something you are. Implemented through biometrics.

69
Q

To catch advanced attacks you look for a __ such as a zero day attack.

A

Anomoly since it is unknown

70
Q

To catch traditional attacks you look for a __ which is a pattern of activity for known attacks.

A

Signature

71
Q

Two factor authentication is always better than single factor authentication. True or False

A

False. Two factor is only better if there is an overlapping element e.g. something you have and know is better than just something you have. However biometrics may be better than something you have and know. It depends on the question e.g. if there is a requirement to use a physical attribute choose something you are.

72
Q

Using a __, a password is only generated when you’re ready to authenticate e.g. Symantec VIP.

A

Asynchronous Dynamic Password Token

73
Q

What attribute of the Kerberos authentication process makes it so strong?

A

Mutual authentication

74
Q

What is one of the best methods for maintaining access?

A

put expiration dates on it like you would a license, credit card, passport

75
Q

What is the most critical criteria in making a decision?

A

COST since executive will always ask HOW MUCH and if you can’t afford it, it’s not worth looking at anything else. Reliability and user friendliness are secondary components.

76
Q

What type of token generates a new, unique token code at fixed time intervals?

A

Synchronous Dynamic Password Token. Synchronous means ‘same time’

77
Q

With a __ your token and server are synchronized so every 60 seconds, the passwords are generarted whether you’re using it or not e.g. Google Authenticator

A

Synchronous Dynamic Password Token. Synchronous means ‘same time’

78
Q

You can only submit your time card after 3pm on Friday. This is a type of __.

A

Temporal (time-based) Isolation which falls under Non-Discretionary Access Control

79
Q

A type of system where all objects are secret and all subjects are secret would be a __ system. What type of access control is typically used here.

A

Dedicated system (dedicated to a single classification), DAC is typically used here because if someone inadvertently gives access to someone you shouldn’t, it’s low risk since all files and users are at the same level.

80
Q

Type of computer system where objects are at different levels but subjects are at the highest level. Which access control method is typically used here.

A

System high (e.g. data is at unclassified, confidential, secret; all users accessing the system are at secret). DAC is typically used here since if someone inadvertently gives the wrong access to a user, the user still has the proper clearance so low risk.

81
Q

A __ environment is where there are different levels of data and different levels of users that can access the system (e.g. unclassified, secret, top secret data and users with unclassified, secret, top secret clearance). What type of access control should be used here?

A

MLS (multi-level secure system), must use MAC here to ensure the right clearance accesses the right classification. You cannot use DAC since if someone makes a mistake there would be a breach of security e.g. secret user accessing top secret content.

82
Q

Something you do is a subcategory of __.

A

Something you are (biometrics). Something you do would be signing your name or typing text on your keyboard.