Module 19: Access Control Flashcards

1
Q

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

auditing
authorization
authentication
accounting

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the biggest issue with local implementation of AAA?

Local implementation cannot provide secure authentication.
Local implementation supports only TACACS+ servers.
Local implementation does not scale well.
Local implementation supports only RADIUS servers.

A

Local implementation does not scale well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

confidentiality
integrity
scalability
availability

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an example of privilege escalation attack?

A threat actor sends an email to an IT manager to request the root access.
A threat actor performs an access attack and gains the administrator password.
A port scanning attack finds that the FTP service is running on a server that allows anonymous access.
A DDoS attack is launched against a government server and causes the server to crash.

A

A threat actor performs an access attack and gains the administrator password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principle of least privilege access control model?

User access to data is based on object attributes.
Users control access to data they own.
Users are granted the strictest access control possible to data.
Users are granted rights on an as-needed approach.

A

Users are granted rights on an as-needed approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?

accounting
authentication
authorization
accessing

A

Accounting keeps track of how network resources are used.

The who, what, where, when, and how of a user accessing a resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are three access control security services? (Choose three.)

accounting
access
authentication
authorization
availability
repudiation

A

Accounting
Authentication
Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which objective of secure communications is achieved by encrypting data?

authentication
availability
confidentiality
integrity

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which access control model allows users to control access to data as an owner of that data?

attribute-based access control
discretionary access control
nondiscretionary access control
mandatory access control

A

discretionary access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which two protocols are used to provide server-based AAA authentication? (Choose two.)

802.1x
TACACS+
SNMP
SSH
RADIUS

A

TACACS+
RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What three items are components of the CIA triad? (Choose three.)

availability
integrity
access
intervention
confidentiality
scalability

A

What three items are components of the CIA triad? (Choose three.)

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly