Midterm Prep Flashcards
Which Type of control is based on the identity of the requestor and the access rules state what a requestor can or cannot do?
Discretionary access control (DAC).
This policy is termed discretionary because an entity might have access rights that permit the entity, by its own volition, to enable another entity to access some resource.
Source: Book Chapter 4.2 Page 131
What data structure is typically used to implement DAC?
A 2-dimensional matrix.
Source: Book Chapter 4.3 Page 111
Access Control Lists make it easy to look up who all the users are that can access a resource, and the type of access they have for that resource.
True or False?
True
Source: Book Chapter 4.3 Page 111
What does each entry of an access matrix indicate?
Access rights of a particular subject for a particular object.
Source: Book pg. 111
(True/False) DAC is a concept that evolved out of requirements for military information security.
False, DAC is the traditional method for implementing access control, MAC was created out of military necessity.
Source: Book, Ch 4, Pg. 109
(True/False) One problem with DAC is that it is not possible to control information flow.
True
Source: Mandatory Access Control Lecture
(True/False) DAC is popular with corporations because it reflects how they treat their data.
False. Employers mandate explicit policies on who can share what.
Source: Mandatory Access Control Lecture
Put the following statements, regarding the sequence of calls made made by a function call to the stack, in the correct order:
A. Allocate space for local variables by moving the stack pointer down to leave sufficient room for them.
B. Push the parameters for the called function onto the stack.
C. Run the body of the called function.
D. Execute the return function which pops the saved address off the stack and returns control to the calling function.
E. Push the current frame pointer value (which points to the calling routine’s stack frame) onto the stack.
F. Executes the call instruction to call the target function, which pushes the return address onto the stack.
G. Pops the old frame pointer value (restoring the link to the calling routine’s stack frame).
H. Sets the frame pointer to be the current stack pointer value, which now identifies the new stack frame location for the called function.
I. Set the stack pointer back to the value of the frame pointer.
B, F, E, H, A, C, I, G, D
From text pg 327.
An access control mechanism mediates between a user (or a process executing on behalf of a user) and system resources, such as:
a) firewalls
b) routers
c) applications
d) a & b only
f) All of the above
f) All of the above
Textbook, Chapter 4, pg. 108
Which of the following is granting permission to a system entity to access a system resource?
A) Authentication B) Authorization C) Audit D) Allowance E) None of the Above
B, Authorization determines who is trusted for a given purpose Source: Book
Chapter 4.1 Page 130
Access control implements a security policy that verifies the credentials of a user. True or false?
False. Access control implements a security policy that specifies who or what may have access to each specific system resource, and the type of access that is permitted in each instance.
Source: Book pg. 107
Under Mandatory Access Control(MAC), what two properties provide confidentiality:
- No read up: A subject can only read an object of less or equal security level 2. No write down: A subject can only write into an object of greater or equal security level.
Source: Book Chapter 27 Page 27-4
A subject is said to have a security clearance of a given level and an object is said to have a security classification of a given level. True or False?
True
Source: Book Chapter 27 Page 27-4
For the Bell-Lapadula Model (BLP), the properties needed for the confidentiality form of MAC are:
- ds-property and *-property
- ss-property and *-property
- ss-property and ds-property
- None of the above
(Chapter 27.1)
ss-property (simple security property: no read up *-property (star property): no write down
The ds-property is a provision made by BLP for DAC but must be consistent with MAC rules.
Other MAC models such as Bell and La Padua (BLP Model) is focused on Integrity, and BIBA model is focused on Confidentiality. True or false?
False. BLP focuses on Confidentiality and BIBA focuses on Integrity.
Source: P1:L6 MAC slides | Other MAC models
Examples of BLP model classfications are High, Medium, and Low. True or false?
False. Examples are Top Secret, Secret, Confidential.
Source: P1:L6 MAC slides | Other MAC models
MAC cannot be employed with other access control policies, such as DAC, RBAC, and ABAC. True or false?
False. All four access policies (DAC, MAC, RBAC, and ABAC) are not mutually exclusive.
Source: Book, Ch. 4, Pg. 109
In the context of Role-Based Access Control Models, What does RBAC2 provide?
Constraints, mutually exclusive roles, Cardinality
Source: Book Pages 147-148
__ is based on the roles that users assume in a system rather than a user’s identity.
A. DAC
B. MAC
C. RBAC
D. ABAC
C
Source: Book pg. 120
What kind of relationship is a role to a user in RBAC?
A) 1 to 1
B) 1 to Many
C) Many to 1
D) Many to Many
D, a role can have many users. a user can have many roles.
Source: Book Chapter 4.5 Page 146
What aspect of an established RBAC system is likely to change infrequently?
A) The set of resources and the specific access rights associated with a particular role. B) The set of roles in the system. C) The set of users. D) A & B E) None of the above.
D
Source: Book. Ch 4, Pg 120
The RBAC prerequisite role can be used for the following:
A) A way to increase the difficulty of collusion among individuals of different skills or divergent job functions to thwart security policies.
B) For structuring the implementation of the least privilege concept.
C) As a risk mitigation technique for a sensitive or powerful permission.
D) None of the above
B.
Source: Book, Ch 4, Pg 125
Question: What are the 3 attributes of ABAC model?
a) Subject - active entity: user, application, process, device
b) Object - passive entity: file, record, network, domain
c) Environment: date/time, virus activity, network’s security level
Source: book p. 127 https://www.proprofs.com/quiz-school/story.php?title=mr-f-quiz-network
Question: How does ABAC model controls access?
ABAC evaluates attributes of subject/object and access control rule defining allowable operation in a given environment
Source: book p. 127
In the Attribute-Based Access Control (ABAC) model: current date and time, the current virus/hacker activities, and the network’s security level are known as ____
A) Object attributes B) Subjects attributes C) Environment attributes D) Access Right E) None of the Above
C. environments describe the operational, technical, and even situational environment or context in which the information access occurs
Source: Book Chapter 4.6 Page 149
In a(n) _ model, authorizations can be defined that express conditions on properties of both the resource and the subject.
A. DAC
B. MAC
C. RBAC
D. ABAC
D
Source: Book pg. 126
The strength of the ABAC approach is its ____ and ____.
A. strictness, performance
B. flexibility, expressive power
C. extensibility, ease of use
D. None of the above
B
Source: Book pg. 126
_is the process of performing authorized queries and deducing unauthorized information from the legitimate response received.
Inference
Source: book p.166
Question: What are the approaches to deal with inference attack?
a) Inference detection during DB design: removing data dependencies, using more fine-grained access control roles in RBAC scheme
b) Inference detection at query time: if inference channel is detected, the query is denied.
Source: book p.167
A ___ can provide restricted access to a relational database so a user or application only has access to certain rows or columns.
A. primary key
B. view
C. relation
D. tuple
B
Source: Book pg. 153
\_\_\_ is an attack that exploits a security vulnerability occurring in the database layer of an application (such as queries). A. Trojan horse B. Logic bomb C. SQLi D. Buffer overflow
C
Source: Book pg. 156
Improper handling of user input can result in a SQL injection. True or false?
True. The attack is viable when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements OR user input is not strongly typed.
Source: Book pg. 156
SQLi attacks can be grouped into three main categories: ___, ____, and __.
A. parameterized, user input, blind injection
B. second-order injection, out-of-band, parameterized
C. inferential, blind injection, inband
D. inband, inferential, out-of-band
D
Source: Book pg 158
What are the main avenues of attack for SQL injection?
A. Cookies B. Server variables C. User input D. Second-order injection E. Physical user input F. All of the above G. None of the above
F
Source: Book pg. 158
Defensive coding is an effective way to dramatically reduce the threat from SQLi. True or false?
True
Source: Book pg. 160
The Trusted Computing Base or TCB has 3 main requirements which of the following is not a requirement.
A.) Complete mediation between the OS and the hardware resources and applications. In addition the OS must make sure the application has the necessary authorizations.
B.) The OS must be tamperproof.
C.) The OS must must be able to go from user to kernel mode without errors
D.)The OS must be correct the protected resources are used properly
C
Lectures 2 OS and Security
_attack occurs when user input is incorrectly filtered for string escape characters or user input is not strongly typed.
SQLi
Source: book p.156
Illegal/logically incorrect queries return often overly descriptive errors from the application server and allow an attacker to gather important information about the server. This is part of what type of attack?
inferential attack
Source: book p.159
Which of the following are proper measures to defend against SQLi attacks?
a) user input validation
b) parameterized query insertion
c) SQL DOM
d) a and b
e) All of the above
e)
Source: book p.160
Which of the following Detection methods to prevent SQLi attacks define a training phase to learn normal behavior?
A) Anomaly-based
B) Signature-based
C) Code analysis
D) None of the above
A. Anamoly based attempts to define normal behavior then detect behavior patterns outside the normal range.
Source: Book Chapter 5.4 Page 182
There are _ generations of antivirus software.
C
From: https://www.proprofs.com/quiz-school/story.php?title=mr-f-quiz-network
A __ virus is a virus that mutates with every infection, making detection by the “signature” of the virus impossible.
A. Metamorphic
B. Encrypted
C. Polymorphic
D. Stealth
C
From: https://www.proprofs.com/quiz-school/story.php?title=mr-f-quiz-network
Which of the following viruses are classified by concealment?
A) Macro Virus B) Encrypted Virus C) Polymorphic Virus D) Metamorphic Virus E) B, C, D F) All of the above
E. viruses in B,C,D fit this description. Macro viruses are classified by Target rather than concealment
Source: Book Chapter 6.3 Page 215