Q14 Flashcards
Which of the following best describes an explicit deny principle?
A. All actions that are not expressly denied are allowed.
B. All actions that are not expressly allowed are denied.
C. All actions must be expressly denied.
D. None of the above.
C. All actions must be expressly denied.
What is the intent of least privilege?
A. Enforce the most restrictive rights required by users to run system processes.
B. Enforce the least restrictive rights required by users to run system processes.
C. Enforce the most restrictive rights required by users to complete assigned tasks.
D. Enforce the least restrictive rights required by users to complete assigned tasks.
C. Enforce the most restrictive rights required by users to complete assigned tasks.
Which of the following models is also known as an identity-based access control model? A. Discretionary access control B. Role-based access control C. Rule-based access control D. Mandatory access control
A. Discretionary access control
A central authority determines which files a user can access. Which of the following best describes this?
A. An access control list (ACL)
B. An access control matrix
C. Discretionary access control model
D. Nondiscretionary access control model
D. Nondiscretionary access control model
A central authority determines which files a user can access based on the organization’s hierarchy. Which of the following best describes this? A. Discretionary access control model B. An access control list (ACL) C. Rule-based access control model D. Role-based access control model
D. Role-based access control model
Which of the following best describes a rule-based access control model?
A. It uses local rules applied to users individually.
B. It uses global rules applied to users individually.
C. It uses local rules applied to all users equally.
D. It uses global rules applied to all users equally.
D. It uses global rules applied to all users equally.
What type of access control model is used on a firewall? A. Mandatory access control model B. Discretionary access control model C. Rule-based access control model D. Role-based access control model
C. Rule-based access control model
Which of the following best describes a characteristic of the mandatory access control model? A. Employs explicit-deny philosophy B. Permissive C. Rule-based D. Prohibitive
D. Prohibitive
Which of the following can help mitigate the success of an online brute-force attack? A. Rainbow table B. Account lockout C. Salting passwords D. Encryption of password
B. Account lockout
What type of attack uses email and attempts to trick high-level executives? A. Phishing B. Spear phishing C. Whaling D. Vishing
C. Whaling