Domaine 3 : Architecture de sécurité Flashcards

1
Q

What is Discretionary Access Control (DAC)?

A

Access decisions are made by the resource owner

DAC allows owners to determine who has access to their resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Mandatory Access Control (MAC) rely on?

A

Access is based on fixed policies and classifications

MAC is often used in environments requiring high security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is access assigned in Role-Based Access Control (RBAC)?

A

Access is assigned based on user roles within an organization

RBAC simplifies management by grouping users with similar access needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the basis for access decisions in Attribute-Based Access Control (ABAC)?

A

Access decisions are based on attributes (e.g., user, resource, environment)

ABAC offers fine-grained access control compared to other models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define the principle of Least Privilege.

A

Users are granted the minimum access necessary to perform their duties

This principle helps minimize potential security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Separation of Duties aim to prevent?

A

Prevents fraud or error

It ensures that no single individual has control over all aspects of a critical task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Time-of-Day Restrictions?

A

Access is limited to specific times to enhance security

This helps to restrict access during non-business hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do Location-Based Restrictions control?

A

Access is controlled based on geographic location

This can prevent unauthorized access from non-approved locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of Access Control Lists (ACLs)?

A

Define permissions attached to objects specifying which users can access them

ACLs are essential for managing access to resources effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Group Policies used for?

A

Used to manage user and computer settings in an Active Directory environment

Group Policies streamline the administration of settings across multiple users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Multifactor Authentication (MFA) combine?

A

Combines multiple authentication methods to verify identity

MFA enhances security by requiring more than one form of verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Principle of Least Privilege?

A

Users are granted only the permissions necessary to perform their job functions

This principle minimizes potential damage from malicious activities or accidental misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does Discretionary Access Control (DAC) entail?

A

Resource owners determine access permissions.

DAC is common in standard operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Mandatory Access Control (MAC)?

A

Access decisions are based on fixed policies and classifications.

MAC is often used in environments requiring high security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Role-Based Access Control (RBAC).

A

Permissions are assigned based on user roles within an organization.

RBAC simplifies management by grouping users with similar access needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Rule-Based Access Control?

A

Access is determined by system-enforced rules set by administrators.

Examples include time-based restrictions or specific browser requirements.

17
Q

Describe Attribute-Based Access Control (ABAC).

A

Access decisions are based on attributes (e.g., user, resource, environment).

ABAC allows for more granular and context-aware access control.

18
Q

What are Time-of-Day Restrictions?

A

Access can be limited to specific times or days.

This enhances security by restricting access during non-business hours.

19
Q

What is the Principle of Least Privilege?

A

Users are granted only the permissions necessary to perform their job functions

This principle minimizes potential damage from malicious activities or accidental misuse.

20
Q

What does Discretionary Access Control (DAC) entail?

A

Resource owners determine access permissions.

DAC is common in standard operating systems.

21
Q

What is Mandatory Access Control (MAC)?

A

Access decisions are based on fixed policies and classifications.

MAC is often used in environments requiring high security.

22
Q

Define Role-Based Access Control (RBAC).

A

Permissions are assigned based on user roles within an organization.

RBAC simplifies management by grouping users with similar access needs.

23
Q

What is Rule-Based Access Control?

A

Access is determined by system-enforced rules set by administrators.

Examples include time-based restrictions or specific browser requirements.

24
Q

Describe Attribute-Based Access Control (ABAC).

A

Access decisions are based on attributes (e.g., user, resource, environment).

ABAC allows for more granular and context-aware access control.

25
Q

What are Time-of-Day Restrictions?

A

Access can be limited to specific times or days.

This enhances security by restricting access during non-business hours.