SEC+ Revision Questions Access Control Flashcards
A network administrator must grant the appropriate network permissions to a new employee. Which of the following is the best strategy?
A. Give the new employee user account the necessary rights and permissions.
B. Add the new employee user account to a group. Ensure the group has the necessary rights and permissions.
C. Give the new employee administrative rights to the network.
D. Ask the new employee what network rights they would like.
B. Add the new employee user account to a group. Ensure the group has the necessary rights and permissions.
In securing your network, you enforce complex user passwords. Users express concern about forgetting their passwords. What should you configure to allay those concerns?
A. Password expiration
B. Periodic password change
C. Password hints
D. Maximum password length
C. Password hints
To quickly give a contractor network access, a network administrator adds the contractor account to the Windows Administrators group. Which security principle does this violate?
A. Separation of duties
B. Least privilege
C. Job rotation
D. Account lockout
B. Least privilege
James is the branch network administrator for ABC, Inc. Recently the company headquarters requested a network security audit, so James performed an audit himself using freely available Linux tools. What is the problem with James’ actions?
A. ABC, Inc., should have sent a network administrator from headquarters to perform the audit.
B. The chief security officer should have conducted the audit.
C. Freely available tools are not reliable and should not have been used.
D. A third party should have been hired to conduct the audit.
D. A third party should have been hired to conduct the audit.
A secure computing environment labels data with various security classifications. Authenticated users must have clearance to read this classified data. What type of access control model is this?
A. Mandatory access control
B. Discretionary access control
C. Role-based access control
D. Time-of-day access control
A. Mandatory access control
To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual access to files, printers, computers, and applications. What security model should you consider using?
A. Mandatory access control
B. Discretionary access control
C. Role-based access control
D. Time-of-day access control
C. Role-based access control
Linda creates a folder called Budget Projections in her home account and shares it with colleagues in her department. Which of the following best describes this type of access control system?
A. Mandatory access control
B. Discretionary access control
C. Role-based access control
D. Time-of-day access control
B. Discretionary access control
You require that users not be logged on to the network after 6 P.M. while you analyze network traffic during nonbusiness hours. What should you do?
A. Unplug their stations from the network.
B. Tell users to press CTRL-ALT-DEL to lock their stations.
C. Configure time-of-day restrictions to ensure nobody can be logged in after 6 P.M.
D. Disable user accounts at 6 P.M.
C. Configure time-of-day restrictions to ensure nobody can be logged in after 6 P.M.
One of your users, Matthias, is taking a three-month sabbatical because of a medical condition, after which he will return to work. What should you do with Matthias’ user account?
A. Delete the account and re-create it when he returns.
B. Disable the account and enable it when he returns.
C. Export his account properties to a text file for later import and then delete it.
D. Ensure you have a backup of his account details and delete his account.
B. Disable the account and enable it when he returns.
During an IT security meeting, the topic of account lockout surfaces. When you suggest all user accounts be locked for 30 minutes after three incorrect logon attempts, your colleague Phil states this is a serious problem when applied to administrative accounts. What types of issues might Phil be referring to?
A. Dictionary attacks could break into administrative accounts.
B. Administrative accounts are much sought after by attackers.
C. Administrative accounts are placed into administrative groups.
D. DoS attacks could render administrative accounts unusable.
D. DoS attacks could render administrative accounts unusable.
Your VPN appliance is configured to disallow user authentication unless the user or group is listed as allowed. Regarding blocked users, what best describes this configuration?
A. Implicit allow
B. Implicit deny
C. Explicit allow
D. Explicit deny
B. Implicit deny
Margaret is the head of Human Resources for Emrom, Inc. An employee does not want to use his annual vacation allotment, but Margaret insists it is mandatory. What IT benefit is derived from mandatory vacations?
A. Irregularities in job duties can be noticed when another employee fills that role.
B. Users feel recharged after time off.
C. Emrom, Inc., will not be guilty of labor violations.
D. There is less security risk when fewer users are on the network.
A. Irregularities in job duties can be noticed when another employee fills that role.
What type of attack is mitigated by strong, complex passwords?
A. DoS
B. Dictionary
C. Brute force
D. DNS poisoning
B. Dictionary
A government contract requires your computers to adhere to mandatory access control methods and multilevel security. What should you do to remain compliant with this contract?
A. Patch your current operating system.
B. Purchase new network hardware.
C. Use a trusted OS.
D. Purchase network encryption devices.
C. Use a trusted OS.
Which term is best defined as an object’s list of users, groups, processes, and their permissions?
A. ACE
B. ACL
C. Active Directory
D. Access log
B. ACL