Managing Accounts Flashcards

1
Q

What type of control is Least privilege?

A

Technical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is least privilege different to Need To know?

A

Need to know is about what data and information people should be allowed to access and least privilege is about ensuring that they can only access THAT data plus what they can do with it once they have access to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the risk of using service accounts?

A

because service accounts are machines, they can’t respond to password renewal requests from the domain controller. Developers have to ensure they manage this themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it not a good idea to delete a user acc as soon as they leave, instead of just disable it?

A

Deleting the account also deletes any encryption keys. If the user has encrypted any data, it won’t be able to be de-encrypted and recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two goals of credential management?

A

1) simplify managing credentials for users

2) ensuring unauthorized people can’t access them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What two other names is Role Based Access Control otherwise known?

A

Hierarchy-based or job-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What document would you create to map roles with related privileges?

A

A matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

regarding role-BAC, what would you assign a user to in Windows?

A

A Group (or security group)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What access control model does the below describe?

1) every object has an owner
2) the owner has full, explicit control over the object
3) NTFS uses this model

A

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blanks about Mandatory Access Control

1) the MAC model uses …. labels for …. and …
2) it is commonly used when access needs to be restricted base on ….
3) sensitivity labels often reflect BOTH … levels of data AND … granted to individuals

A

1) the MAC model uses SENSITIVITY (or security) labels for USERS and DATA
2) it is commonly used when access needs to be restricted base on NEED TO KNOW
3) sensitivity labels often reflect BOTH CLASSIFICATION levels of data (Top Secret etc) AND CLEARANCES granted to individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access is defined by system administrators, TRUE or FALSE?

A

False. It is defined by security professionals and/or higher level entities in the organization.
The administrator establishes the access based on the definitions that come from above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which access control methid uses attributes defined in policies and is commonly used by software defined networks?

A

Attribute Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of access control is based on an approved set of instructions, like an access control list on a router?

A

Rule-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What access model uses a lattice to illustrate the levels of security with data?

A

the Mandatory Access Control Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What access control method can modify the access automatically in response to an event?

A

rule-based access control. e.g. IPS device detecting an attack can change an ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In access control, what is Policy Enforcement and Policy Definition?

A

Policy Enforcement = authorization

Policy Definition - process of determining rights (done by senior security managers usually)

17
Q

Which type of access control allows the user to modify the access?

A

DAC - creators can modify the access to files/folders

18
Q

Databases have their own access control, true or false?

A

True