IS3340 CHAPTER 3 Flashcards
An individual entry in a CACL is called ___?
ACCESS CONTROL ENTRY (ACE)
The list of access permissions for an object is called ___?
ACCESS CONTROL LIST (ACL)
Shared database of domain users, groups, computers, resources, and other information, along with network functionality to centralize and standardize network management and interoperation is called ___?
ACTIVE DIRECTORY
This is an access control approach that systematically nests individual user accounts in groups that make securing objects more general. It is an acronym for Accounts, Global groups, Universal groups, domain Local groups, and Permissions and is usually called ___?
AGULP
The process of collecting performance information on what actions were taken and storing that information for later analysis is called ___?
AUDITING
GUIDS used in the Windows registry to identity objects and record many of their attributes is called ___?
CLASS IDENTIFIERS (CLSIDs)
An international set of standards for functionality and assurance of computer security. This is supersedes the Orange Book as well as other standards and is called ___?
COMMON CRITERIA
The list of access permissions for an object, based on access granted by the object’s owner is called ___?
DISCRETIONARY ACCESS CONTROL LIST (DACL)
A server computer designated to handle Active Directory requests is called ___?
DOMAIN CONTROLLER
Access permissions to an object calculated based on the requesting subjects’ identification and group memberships is called ___?
EFFECTIVE PERMISSIONS
Identification value that is unique across all environments to keep track of an object across many computers is called ___?
GLOBALLY UNIQUE ID (GUID)
A set of named entities that define a group of users for the purposes of defining permissions that apply to multiple users is called ___?
GROUP
A computer network authentication protocol which allows computers to communicate in a secure manner across an insecure network, and the default authentication protocol for Windows. This is called ___?
KERBEROS
A computer designated to authenticate users and, upon authentication, issue Kerberos keys that will allow subjects to access objects is called ___?
KEY DISTRIBUTION CENTER (KDC)
User accounts that are defined using the principle of least privilege is called ___?
LEAST PRIVILEGE USER ACCOUNTS (LUAs)