IS3230 CHAPTER 8 Flashcards
In window-based systems, a value that specifies the rights that are allowed or denied in an access control entry (ACE) of an access control list (ACL) is called ___.
ACCESS MASK
This stores information about objects on the network and makes this information available for authorized systems administrators and users. It gives network users access to permitted resources anywhere on the network using a single sign-on process. Also provides system admin with an intuitive hierarchical view of the network and a single point of administration for all network objects is called ___.
ACTIVE DIRECTORY
A collection of binary data stored in a relational database is called ___.
BINARY LARGE OBJECTS (BLOBs)
Objects that inherit certain characteristics, such as access controls, from a parent object is called ___.
CHILD OBJECTS
The stored data may be in archival form on tape or optical disc, on a hard disk, or sitting in a system’s buffers is called ___.
DATA AT REST (DAR)
Data as it travels from one place to another, such as over a network is called ___.
DATA IN MOTION (DIM)
Rights that are given to a user by the owner of an object is called ___.
DELEGATED ACCESS RIGHTS
A DAC system where rights are assigned by the owner of the resource in question is called ___.
DISCRETIONARY ACCESS CONTROL LIST (DACL)
Access rights that are actively given to a user by an object owner is called ___.
EXPLICITLY DELEGATED RIGHTS
The outermost boundary of an Active Directory service. This may contain several domains is called ___.
FOREST
Rights that are inherited or otherwise passively assigned is called ___.
IMPLICITLY DELEGATED RIGHTS
A combination of hardware and software used to analyze network traffic passing through a single point on the network. It is designed to analyze traffic patterns to find suspicious activity is called ___.
INTRUSION DETECTION
An application layer protocol for querying and modifying directory services running under Transmission Control Protocol/Internet Protocol (TCP/IP)
LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP)
A patch to the Linux kernel and a set of administrative tools that attempt to enhance security is called ___.
LINUX INTRUSION DETECTION SYSTEM (LIDS)
A service that provides information to all systems on a network is called ___.
NETWORK INFORMATION SERVICE (NIS)