Quick Tips 3 Flashcards

1
Q

Examples of BLANK controls are system access, network architecture, network access, encryption and protocols, and auditing.

A

technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For a subject to be able to access a resource, it must be BLANK, BLANK, and BLANK, and should be held BLANK for its actions.

A

identified, authenticated, authorized, accountable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BLANK can be accomplished by biometrics, a password, a passphrase, a cognitive password, a one-time password, or a token.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Type I error in biometrics means BLANK , and a Type II error means BLANK .

A

the system rejected an authorized individual, an imposter was authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A BLANK cannot process information, but a BLANK can through the use of integrated circuits and processors.

A

memory card, smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BLANK and BLANK principles limit users’ rights to only what is needed to perform tasks of their job.

A

Least-privilege, need-to-know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BLANK capabilities can be accomplished through Kerberos, SESAME, domains, and thin clients.

A

Single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Kerberos user receives a BLANK, which allows him to request access to resources through the BLANK. The BLANK generates a new ticket with the session keys.

A

ticket granting ticket (TGT), ticket granting service (TGS), TGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of access control attacks include BLANK.

A

denial of service, spoofing, dictionary, brute force, and war dialing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BLANK is a type of auditing that tracks each keystroke made by a user.

A

Keystroke monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BLANK can unintentionally disclose information by assigning media to a subject before it is properly erased.

A

Object reuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Just removing BLANK to files (deleting file, formatting hard drive) is not always enough protection for proper object reuse.

A

pointers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Information can be obtained via electrical signals in airwaves. The ways to combat this type of intrusion are BLANK.

A

TEMPEST, white noise, and control zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User authentication is accomplished by what someone BLANK.

A

knows, is, or has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BLANK can use synchronous (time, event) or asynchronous (challenge-based) methods.

A

One-time password-generating token devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BLANK requires two of the three user authentication attributes (what someone knows, is, or has).

A

Strong authentication

17
Q

The following are weaknesses of Kerberos: the KDC is a single point of failure; it is susceptible to BLANK; session and secret keys are BLANK; KDC needs to always be BLANK; and there must be management of BLANK.

A

password guessing, locally stored, available, secret keys