IS3230 CHAPTER 10 Flashcards

1
Q

An element of the access control list known as (ACE) is called ___.

A

ACCESS CONTROL ENTRY (ACE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A list of security policies that is associated with an object is called ___.

A

ACCESS CONTROL LIST (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Someone trying to compromise information or data is called ___.

A

ATTACKER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The service provided through Kerberos that identifies users on a computer system and is part of the Key Distribution Center is called ___.

A

AUTHENTICATION SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A message that is part of the Kerberos authentication process and is composed of the client ID and timestamp is called ___.

A

AUTHENTICATOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A model that defines basic principles of access controls is called ___.

A

BELL-LaPADULA MODEL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information that has cryptographic protection applied to it is called ___.

A

CLEAR TEXT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Products that are easily available to anyone is called ___.

A

COMMERCIAL OFF-THE-SHELF (COTS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ISO/IEC 15408 standard for computer security is called ___.

A

COMMON CRITERIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

.Unauthorized access and release of information is called ___.

A

COMPROMISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to control access to resources this is called ___.

A

CREDENTIALS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used to protect data so that it cannot be easily read or understood is called ___.

A

CRYPTOGRAPHY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attack against a system that limits it from doing the tasks it is intended to do is called ___.

A

DENIAL OF SERVICE (DoS) ATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Provides a means of verifying identities of computer systems on an unprotected network. This is designed to provide strong authentication for client/server applications by using secret-key cryptography is called ___.

A

KERBEROS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The service or server that acts as both the ticket granting service and the authentication service is called ___.

A

KEY DISTRIBUTION CENTER (KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The use of policies within a network infrastructure to limit access to resources until the system proves that it has complied with the policy is called ___.

A

NETWORK ACCESS CONTROL (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This divides the network infrastructure into seven layers and is called ___.

A

OPEN SYSTEMS INTERCONNECTION (OSI) REFERENCE MODEL

18
Q

This is orange and part of the “Rainbow Series” published by the US DOD is called ___.

A

ORANGE BOOK

19
Q

A key used to encrypt and decrypt messages is called ___.

A

SECRET KEY

20
Q

A variable that identifies a user, group, or account is called ___.

A

SECURITY IDENTIFIER (SID)

21
Q

An access point’s ID on a wireless LAN is called ___.

A

SERVICE SET IDENTIFIER (SSID)

22
Q

.A method of access control that allows a user to log on to a system and gain access to other resources within the network via the initial logon. It helps a user avoid having to log on multiple times and remember multiple passwords for various systems is called ___.

A

SINGLE SIGN-ON (SSO)

23
Q

The act of identifying a suer as authentic with a single authentication factor is called ___.

A

SINGLE-FACTOR AUTHENTICATION

24
Q

A form of encryption where the sender and the receiver use the same key for encrypting an object is called ___.

A

SYMMETRIC ENCRYPTION

25
Q

Encryption used for WLANs is called ___.

A

TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)

26
Q

The act of identifying a suer as authentic with three authentication factors is called ___.

A

THREE-FACTOR AUTHENTICATION

27
Q

A server or service that is authorized to issue tickets to the client after the client has already received a ticket granting ticket and is called ___.

A

TICKET-GRANTING SERVICE (TGS)

28
Q

Being open and honest about the infrastructure; not hiding any data from the users is called ___.

A

TRANSPARENCY

29
Q

The act of identifying a user as authentic with two authentication factors is called ___.

A

TWO-FACTOR AUTHENTICATION

30
Q
  1. What does ACL stand for?
  2. Access control level
  3. Access control limit
  4. Access control logic
  5. Access control list
A

Access control list

31
Q
  1. List the four types of access control models.
A

MANDATORY access control (MAC)
DISCRETIONARY access control (DAC)
ROLE BASED access control (RBAC)
ATTRIBUTE-BASED access control (ABAC)

32
Q
  1. Which of the following are components of a Kerberos system? (Select two)
  2. TKIP
  3. AS
  4. GS
  5. BGP
A

AS

GS

33
Q
  1. A switch is a divide used on which layer of the OSI model?
  2. Layer 1
  3. Layer 2
  4. Layer 4
  5. Layer 5
A

Layer 2

34
Q
5. Which of the following are authentication factors? (Select three)
1,  Something you need 
2, Something you have
3, Something you are 
4, Something you believe
5, Something you know
A

Something you have
Something you are
Something you know

35
Q
  1. VLANs are used to segment networks.

TRUE OR FALSE

A

TRUE

36
Q
  1. What are types of access control lists?
  2. DACL
  3. MACL
  4. SACL
  5. TACL
A

DACL

SACL

37
Q
  1. Passwords should have no time limit assigned to them.

TRUE OR FALSE

A

FALSE

38
Q
  1. Which of the following is the most secure encryption method for WLANs?
  2. DAC
  3. WEP
  4. WPA
  5. MAC
A

WPA

39
Q
  1. How many hexadecimal digits are provided by IEEE for vendor identification?
  2. 6
  3. 12
  4. 18
  5. 24
A

6

40
Q
  1. Which IEEE standard defines WLANs?
  2. 802.11
  3. 802.10
  4. 802.5
  5. 802.1q
A

802.11

41
Q
  1. Which of the following is an example of SSO?
  2. Keystroke logger
  3. Trojan horse
  4. Kerberos
  5. Broadcast domains
A

Kerberos