IS3340 CHAPTER 2 Flashcards
The process of providing and denying access to objects is called ___?
ACCESS CONTROL
Shared database of domain users, groups, computers, resources, and other information, along with network functionality to centralize and standardize network management and interoperation is called ___?
ACTIVE DIRECTORY
The collection of all possible vulnerabilities that could provide unauthorized access to computer resources; all of the software a computer runs that is vulnerable to attack is called ___?
ATTACK SURFACE
Proving that provided identity credentials are valid and correct is called ?
AUTHENTICATION
Granting and/or denying access to resources based on the authenticated user is called ___?
AUTHORIZATION
A level of sensitivity assigned to an object by its owner. An example object could be assigned as top secret, secret, confidential, restricted, or unclassified and is called ___?
CLASSIFICATION
A security level assigned to subjects, authorizing them to access objects with an equal or lower classification. These levels include top secret, secret, and confidential and is called ___?
CLEARANCE
Any mechanism or action that prevents, detects, or addresses an attack is called ___?
CONTROL
An access control method based on an object’s owner and permissions granted by the owner is called ___?
DISCRETIONARY ACCESS CONTROL (DAC)
To take advantage of a specific vulnerability is called ___?
EXPLOIT
Software layer in the operating system kernel that provides the actual access to physical hardware is called ___?
HARDWARE ABSTRACTION LAYER(HAL)
Providing credentials that claim a specific identity, such as a user name is called ___?
IDENTIFICATION
The core part of an operating system that provides the essential services of the operating system is called ___?
KERNEL
An attack in which the attacker is located between a client and a server and intercepts traffic flowing back and forth between the two computers. The attacker can view or modify data that is transmitted in the clear. This is called ___?
Man in the middle Attack
The portion of an operating system’s kernel that resides exclusively in memory is called ___?
MICROKERNEL
Authentication process that requires multiple types of authentication credentials is called ___?
MULTI-FACTOR AUTHENTICATION
A resource to which access is controlled is called ___?
OBJECT
This defines what a user can do to a specific object, such as read or delete the object and is called ___?
PERMISSION
User rights define tasks that a user is permitted to carry out, such as take ownership of objects or shut down the computer and is called ___?
RIGHT
An access control method based on permissions defined by a role, e.g., manager, authorized user, guest, as opposed to an individual user, e.g., Michael Solomon. This is called ___?
ROLE BASED ACCESS CONTROL (RBAC)
A unique identifier for each user and group in a Windows environment is called ___?
SECURITY IDENTIFIER (SID)
An entity requesting access to an object is called ___?
SUBJECT
The highest privilege at which programs can run, allowing access to the physical hardware and kernel resources. AKA kernel mode and is called ___?
SUPERVISOR MODE
Authentication process that requires two separate types of authentication credentials is called ___?
TWO-FACTOR AUTHENTICATION
Authentication based on information only a valid user knows, such as a password or PIN is called ___?
TYPE I AUTHENTICATION
Authentication based on a physical object that contains identity information, such as a token, card, or other device is called ___?
TYPE II AUTHENTICATION
Authentication based on a physical characteristic (biometric), such as a fingerprint, hand print, or retina characteristic is called ___?
TYPE III AUTHENTICATION
Limited privilege for running programs that does not allow direct access to the computer’s physical hardware or certain kernel resources is called ___?
USER MODE
- Which of the following is NOT a goal of a secure environment?
- All required information is available to authorized users
- No information is available to unauthorized user
- All required information is available
- No classified information is available to unauthorized users
All required information is available
- Which term describes the central component of an operating system?
- Kernel
- Shell
- Hardware Abstraction Layer
- Executive
Kernel
- what are the two run modes for windows programs?
- supervisor mode and executive mode
- Kernel mode and supervisor mode
- User mode and executive mode
- Kernel mode and user mode
Kernel mode and user mode
- Which of the following Windows components resides in memory to provide the core operating system services?
- Kernel
- Microkernel
- Executive
- Hardware Abstraction Layer
Microkernel
- what is the name of the process which proves you are who you say you are?
- Identification
- Authorization
- Permission
- Authentication
Authentication
- Which type of authentication is a smart card?
- Type I
- Type II
- Type III
- Type IV
Type II
- Which access control method relates data classification to user clearance?
- MAC
- DAC
- RBAC
- LDAC
MAC
- What value uniquely identifies a user or group in Windows?
- UID
- SAT
- SID
- ACE
SID
- If the same user is created on three separate Windows computers, which value is the same on all three computers?
- SID
- User code
- Username
- SAT
Username
- Which Windows feature allows users and groups to be “shared” among machines?
- Domain control
- Workgroup
- SID
- Active Directory
Active Directory
- What defines the limit of how many computers share users and groups?
- SID
- GUID
- Domain
- Workgroup
Domain
- Which of the following best describes the term “attack surface”?
- All possible vulnerabilities in application software that could be exploited
- All possible vulnerabilities that could be exploited
- The most likely avenues of attack
- Known vulnerabilities that have not been patched
All possible vulnerabilities that could be exploited
- When possible, what is the best way to mitigate vulnerability in a specific service?
- Remove the service
- Disable the service
- Block access to the service
- Patch the service
Remove the service
- When monitoring a Windows system, with what do you compare current system performance to test for security compliance?
- The previous monitoring results
- A normal performance scan
- A stated baseline
- A defined security goal
A stated baseline
- Why should you immediately test your system for security compliance after making a configuration change?
- Configuration changes generally increase security
- Configuration changes generally decrease security
- Configuration changes may introduce new vulnerabilities
- Configuration changes may remove existing vulnerabilities
Configuration changes may introduce new vulnerabilities