Exploring Control Types and Methods Flashcards
Of the following choices, what type of control is least privilege? A. Corrective B. Technical C. Detective D. Preventative
B. The principle of least privilege is a technical control and ensures that users have only the rights and permissions needed to perform the job, and no more. A corrective control attempts to reverse the effects of a problem. A detective control (such as a security audit) detects when a vulnerability has been exploited. A preventative control attempts to prevent an incident from occurring.
Of the following choices, what type of control is a vulnerability assessment? A. Corrective B. Management C. Detective D. Technical 3. Which of the
B. A vulnerability assessment is a management control and attempts to discover weaknesses in systems. A corrective control attempts to reverse the effects of a problem. A detective control (such as a security audit) detects when a vulnerability has been exploited. A technical control (such as the principle of least privilege) enforces security using technical means.
Which of the following is a preventative control that can prevent outages due to ad-hoc configuration errors?
A. Least privilege
B. A periodic review of user rights
C. Change management plan
D. Security audit
C. A change management strategy can prevent outages by ensuring that configuration changes aren’t made on an as-needed (ad-hoc) basis, but instead are examined prior to making the change; change management is also known as an operational control. The principle of least privilege is a technical control and ensures that users have only the rights and permissions needed to perform the job, and no more. A security audit is a detective control and a periodic review of user rights is a specific type of detective control.
Which of the following is a preventative control? A. Least privilege B. Security audit C. Security guard D. Periodic review of user rights
C. A security guard (armed or not armed) is a preventative physical security control. The principle of least privilege is a technical control and ensures that users have only the rights and permissions needed to perform the job, and no more. A security audit is a detective control and a periodic review of user rights is a specific type of detective control.
Your organization regularly performs routine security audits to assess the security posture. What type of control is this? A. Corrective B. Technical C. Detective D. Preventative
C. A security audit is a form of detective control, since it will detect when a vulnerability has been exploited after the fact. A corrective control attempts to reverse the effects of a problem. A technical control (such as the principle of least privilege) enforces security using technical means. A preventative control attempts to prevent an incident from occurring.
Of the following choices, what is a detective security control? A. Change management B. HVAC C. CCTV D. User training
C. A closed-circuit television (CCTV) system can record activity and can detect what occurred as a detective security control. Change management is a preventative control. HVAC is an environmental control that is preventative. User training is preventative.
An administrator is assigning access to users in different departments based on their job functions. What access control model is the administrator using? A. DAC B. MAC C. RBAC D. CAC
C. In a role-based access control (RBAC) model, roles are used to define rights and permissions for users. The DAC model specifies that every object has an owner, and the owner has full, explicit control of the object. The MAC model uses sensitivity labels for users and data. A CAC is an identification card that includes smart-card capabilities.
You manage user accounts for a sales department. You have created a sales user account template to comply with the principle of least privilege. What access control model are you following? A. DAC B. MAC C. RBAC D. DACL
C. The role-based access control (RBAC) model can use groups (as roles) with a user account template assigned to a group to ensure new users are granted access only to what they need, and no more. The DAC model specifies that every object has an owner, and the owner has full, explicit control of the object. The MAC model uses sensitivity labels for users and data. A DACL is an access control list used in the DAC model.
Windows systems protect files and folders with New Technology File System (NTFS). What access control model does NTFS use?
A. Mandatory access control (MAC)
B. Discretionary access control (DAC)
C. Rule-based access control (RBAC)
D. Implicit allow
B. Windows systems use the discretionary access control (DAC) model by default for NTFS files and folders. The MAC model uses labels. Rule-based access control uses rules to determine access. There is no such access control model as implicit allow. However, implicit deny is commonly used as the last rule in a firewall to indicate that all traffic not explicitly allowed is implicitly denied.
What is the purpose of a cipher lock system?
A. Control door access with a keypad
B. Control door access with a proximity card C. Control access to a laptop with biometrics D. Control access to laptop with a smart card
A. A cipher lock system is a door access security method and only opens after a user has entered the correct code into the cipher lock. A proximity card uses a proximity card reader, not a cipher lock. Biometric readers (such as a fingerprint reader) and smart cards can be used as authentication for systems such as laptop systems.
What can you use to electronically unlock a door for specific users? A. Token B. Proximity card C. Physical key D. Certificate
B. Proximity cards are used as an additional access control in some areas to electronically unlock doors. A token (such as an RSA token) provides a rolling password for one-time use. A physical key does not electronically unlock a door. A certificate can be embedded in a smart card but, by itself, it would not electronically unlock a door.
An organization wants to prevent unauthorized personnel from entering a secure workspace. Of the following choices, what can be used? (Choose two). A. Security guard B. Piggybacking C. CCTV D. Proximity cards
A, D. Security guards and proximity cards are valid methods to prevent unauthorized personnel from entering a secure workspace, such as a secure datacenter. Piggybacking (also called tailgating) occurs when one user follows closely behind another user without using credentials; it can be prevented with a mantrap. A CCTV can detect if an unauthorized entry occurred and provide reliable proof of the entry, but it can’t prevent it.
A company hosts a datacenter with highly sensitive data. Of the following choices, what can provide the best type of physical security to prevent unauthorized entry? A. Proximity card B. CCTV C. ID badges D. Mantrap
D. A mantrap is highly effective at preventing unauthorized entry and can also be used to prevent tailgating. A proximity card is useful as an access control mechanism, but it won’t prevent tailgating so it isn’t as useful as a mantrap. CCTV provides video surveillance, and it can record unauthorized entry, but it can’t prevent it. ID badges are useful if the entry is staffed with security guards, but won’t prevent unauthorized entry if used without security guards.
Two employees have entered a secure datacenter. However, only one employee provided credentials. How did the other employee gain entry? A. Mantrap B. HVAC C. Vishing D. Tailgating
D. Tailgating (also called piggybacking) occurs when one user follows closely behind another user without using credentials. A mantrap prevents tailgating. A heating, ventilation, and air-conditioning (HVAC) system can increase availability by ensuring that equipment doesn’t fail due to overheating. Vishing is a variant of phishing techniques and often combines social engineering tactics with Voice over IP (VoIP).
Your organization has several portable USB drives that users are able to use to transfer large video files instead of copying them over the network. What should be used to prevent the theft of these drives when they are not being used? A. HSM B. TPM C. Video surveillance D. Locked cabinet
D. A locked cabinet should be used to help prevent the theft of unused assets. A hardware security module (HSM) is used to create and store encryption keys. A TPM is used for hardware encryption of entire drives. Video surveillance is useful to provide proof of someone entering or exiting a secure space, but is not needed to protect unused assets.