Section 1 Flashcards

1
Q

What are some examples of detective access controls?

A

Security guards, supervising users, incident investigations, and intrusion detections systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples of physical access controls?

A

Guards, fences, motion detectors, locked doors, sealed windows, lights, backups, cable protection, laptop locks, swipe cards, CCTV, mantraps, and alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three commonly recognized authentication factors?

A

Something you know, something you have, and something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a cognitive password?

A

A series of questions about facts or predefined responses that only the subject should know (for example, what is your birthdate? What is your mother’s maiden name?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name at least eight biometric factors

A

Fingerprints, face scans, iris scan, retina scan, palm topography, palm geography, heart/pulse pattern, voice pattern, signature dynamics, keystroke patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the issues related to user acceptance of biometric enrollment and throughput rate?

A

Enrollment takes longer than 2 minutes are unacceptable; subjects will typically accept a throughput rate of about 6 seconds or faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What access control technique employs security labels?

A

Mandatory access controls. Subjects are labeled as to their level of clearance. Objects are labeled as to their level of classification and sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Bell-LaPadula, Biba, and Clark-Wilson access control models were all designed to protect a single aspect of security. Name the corresponding aspect for each model

A

Bell-LaPadula protects confidentiality
Biba protects integrity
Clark-Wilson protects Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the three types of subjects and their roles in a security environment

A

The user accesses objects on a system to perform a work task
The owner is liable for protection of data
The data custodian is assigned to classify and protect data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain why the separation of duties and responsibilities is a common security practice

A

It prevents any single subject from being able to circumvent or disable security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the principle of least privilege?

A

Subjects should only be granted only the amount of access to objects that is required to accomplish their assigned work tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the four key principles upon which access control relies

A

Identification, authentication, authorization, accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are domains related to decentralized access control?

A

A domain is a realm of trust that shares a common security policy. The is a form of decentralized access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is monitoring an important part of a security policy?

A

Monitoring is used to watch for security policy violations and to detect unauthorized or abnormal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the functions of an intrusion detection system (IDS)?

A

An IDS automates the inspection of audit logs and real-time system events, detects intrusion attempts, and watches for violations of confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly