Quiz 12 Flashcards
A list that specifies which subjects are allowed to access an object and what operations they can perform on it is referred to as a(n):
ACE
DAC
entity
ACL
ACL
Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?
A) RADIUS
B) ICMP
C) FTP
D) Telnet
RADIUS
Authentication, authorization, and accounting are sometimes called AAA.
True
False
True
Least privilege in access control means that only the minimum amount of privileges necessary to perform a job or function should be allocated.
True
False
True
Attribute-Based Access Control (ABAC) grants permissions by matching object labels with subject labels based on their respective levels.
True
False
False
Authorization is granting permission for admittance.
True
False
True
Rule-Based Access Control can be changed by users.
True
False
True
With the Discretionary Access Control (DAC) model, no object has an owner;the system has total control over that object.
True
False
False
Attribute-Based Access Control(ABAC) grants permissions by matching object labels with subject label based on their respective level.
True
False
False
Employee onboarding refers to the task associated with hiring a new employee.
True
False
True
Permission auditing and review is intended to examine the permissions that a user has been given to determine if each is still necessary.
True
False
True
A Local Group Policy (LGP) has more options than a Group Policy.
True
False
False
With the Discretionary Access Control (DAC) model, no object has an owner; the system has total control over that object.
True
False
False
Employee onboarding refers to the tasks associated with hiring a new employee.
True
False
True
ACLs provide file system security for protecting files managed by the user.
True
False
False
What type of computer can forward RADIUS messages between RADIUS clients and RADIUS servers?
A) intermediate proxy
B) remote proxy
C) RADIUS proxy
D) translation proxy
RADIUS proxy
During RADIUS authentication, what type of packet includes information such as identification of a specific AP that is sending the packet and the username and password?
A) accounting request
B) access request
C) verification request
D) authentication request
authentication request
Which of the following is a database stored on the network itself that contains information about users and network devices?
A) user permissions
B) network service
C) system registry
D) directory service
directory service
What standard provides a greater degree of security by implementing port-based authentication and blocks all traffic on a port-by-port basis until the client is authenticated using credentials stored on an authentication server?
A) IEEE 802.1a
B) IEEE 802.1x
C) LDAPS
D) TACACS
IEEE 802.1x
When using Role Based Access Control (RBAC), permissions are assigned to which of the following?
A) Roles
B) Groups
C) Labels
D) Users
Roles
Which access control model that uses access based on a user’s job function within an organization?
A) Role Based Access Control
B) Rule Based Access Control
C) Discretionary Access Control
D) Mandatory Access Control
Role Based Access Control
Which access control model is considered to be the least restrictive?
A) Role Based Access Control
B) Rule Based Access Control
C) Discretionary Access Control
D) Mandatory Access Control
Discretionary Access Control
Which access control model can dynamically assign roles to subjects based on a set of defined rules?
A) Role Based Access Control
B) Rule Based Access Control
C) Discretionary Access Control
D) Mandatory Access Control
Rule Based Access Control
What access control model below is considered to be the most restrictive access control model, and involves assigning access controls to users strictly according to the custodian?
A) Role Based Access Control
B) Rule Based Access Control
C) Discretionary Access Control
D) Mandatory Access Control
Mandatory Access Control
What authentication service commonly used on UNIX devices involves communicating user authentication information to a centralized server?
A) TACACS
B) RADIUS
C) Kerberos
D) FTP
TACACS
Select the authentication system developed by the Massachusetts Institute of Technology (MIT) to verify the identity of network users.
A) TACACS
B) RADIUS
C) Kerberos
D) FTP
Kerberos
What framework is used for transporting authentication protocols instead of the authentication protocol itself?
A) CHAP
B) SAML
C) EAP
D) MS-CHAP
EAP
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process called?
A) SAML
B) LDAPS
C) TACACS
D) SDML
LDAPS
What process periodically validates a user’s account, access control, and membership role or inclusion in a specific group?
A) recertification
B) revalidation
C) control audit
D) group auditing
recertification