IS3230 CHAPTER 10 Flashcards
An element of the access control list known as (ACE) is called ___.
ACCESS CONTROL ENTRY (ACE)
A list of security policies that is associated with an object is called ___.
ACCESS CONTROL LIST (ACL)
Someone trying to compromise information or data is called ___.
ATTACKER
The service provided through Kerberos that identifies users on a computer system and is part of the Key Distribution Center is called ___.
AUTHENTICATION SERVICE
A message that is part of the Kerberos authentication process and is composed of the client ID and timestamp is called ___.
AUTHENTICATOR
A model that defines basic principles of access controls is called ___.
BELL-LaPADULA MODEL
Information that has cryptographic protection applied to it is called ___.
CLEAR TEXT
Products that are easily available to anyone is called ___.
COMMERCIAL OFF-THE-SHELF (COTS)
ISO/IEC 15408 standard for computer security is called ___.
COMMON CRITERIA
.Unauthorized access and release of information is called ___.
COMPROMISE
Used to control access to resources this is called ___.
CREDENTIALS
Used to protect data so that it cannot be easily read or understood is called ___.
CRYPTOGRAPHY
An attack against a system that limits it from doing the tasks it is intended to do is called ___.
DENIAL OF SERVICE (DoS) ATTACK
Provides a means of verifying identities of computer systems on an unprotected network. This is designed to provide strong authentication for client/server applications by using secret-key cryptography is called ___.
KERBEROS
The service or server that acts as both the ticket granting service and the authentication service is called ___.
KEY DISTRIBUTION CENTER (KDC)
The use of policies within a network infrastructure to limit access to resources until the system proves that it has complied with the policy is called ___.
NETWORK ACCESS CONTROL (NAC)
This divides the network infrastructure into seven layers and is called ___.
OPEN SYSTEMS INTERCONNECTION (OSI) REFERENCE MODEL
This is orange and part of the “Rainbow Series” published by the US DOD is called ___.
ORANGE BOOK
A key used to encrypt and decrypt messages is called ___.
SECRET KEY
A variable that identifies a user, group, or account is called ___.
SECURITY IDENTIFIER (SID)
An access point’s ID on a wireless LAN is called ___.
SERVICE SET IDENTIFIER (SSID)
.A method of access control that allows a user to log on to a system and gain access to other resources within the network via the initial logon. It helps a user avoid having to log on multiple times and remember multiple passwords for various systems is called ___.
SINGLE SIGN-ON (SSO)
The act of identifying a suer as authentic with a single authentication factor is called ___.
SINGLE-FACTOR AUTHENTICATION
A form of encryption where the sender and the receiver use the same key for encrypting an object is called ___.
SYMMETRIC ENCRYPTION
Encryption used for WLANs is called ___.
TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)
The act of identifying a suer as authentic with three authentication factors is called ___.
THREE-FACTOR AUTHENTICATION
A server or service that is authorized to issue tickets to the client after the client has already received a ticket granting ticket and is called ___.
TICKET-GRANTING SERVICE (TGS)
Being open and honest about the infrastructure; not hiding any data from the users is called ___.
TRANSPARENCY
The act of identifying a user as authentic with two authentication factors is called ___.
TWO-FACTOR AUTHENTICATION
- What does ACL stand for?
- Access control level
- Access control limit
- Access control logic
- Access control list
Access control list
- List the four types of access control models.
MANDATORY access control (MAC)
DISCRETIONARY access control (DAC)
ROLE BASED access control (RBAC)
ATTRIBUTE-BASED access control (ABAC)
- Which of the following are components of a Kerberos system? (Select two)
- TKIP
- AS
- GS
- BGP
AS
GS
- A switch is a divide used on which layer of the OSI model?
- Layer 1
- Layer 2
- Layer 4
- Layer 5
Layer 2
5. Which of the following are authentication factors? (Select three) 1, Something you need 2, Something you have 3, Something you are 4, Something you believe 5, Something you know
Something you have
Something you are
Something you know
- VLANs are used to segment networks.
TRUE OR FALSE
TRUE
- What are types of access control lists?
- DACL
- MACL
- SACL
- TACL
DACL
SACL
- Passwords should have no time limit assigned to them.
TRUE OR FALSE
FALSE
- Which of the following is the most secure encryption method for WLANs?
- DAC
- WEP
- WPA
- MAC
WPA
- How many hexadecimal digits are provided by IEEE for vendor identification?
- 6
- 12
- 18
- 24
6
- Which IEEE standard defines WLANs?
- 802.11
- 802.10
- 802.5
- 802.1q
802.11
- Which of the following is an example of SSO?
- Keystroke logger
- Trojan horse
- Kerberos
- Broadcast domains
Kerberos