Section 20: Access Control Flashcards

1
Q

Access Control Models

A

DAC, MAC, RBAC, ABAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discretionary Access control

A

The access control policy is determined by the owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mandatory Access Control

A

An access control policy where the computer gets to control who gets access, does it through data labels (used in FreeBSD and Linux)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rule Based Access Control

A

Label-based access control that defines whether access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lattice Based Access Control

A

Utilizes complex mathematics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Role-Based Access Control

A

An access model that is controlled by the system (like MAC) but utilizes roles in order to dole out access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attribute Based Access Control

A

think tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Implicit Deny

A

All access is denied by default unless specifically stated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Least Privilege

A

Only allowed to do what is needed to do their job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Separation of Duties

A

Requires more than one person to conduct a sensitive task or operation (think two people signing a check)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Job Rotation

A

Occurs when users are cycled through various jobs to learn the overall operations of the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mandatory Vacation

A

Making someone take a vacation so you can audit them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Organizational Unit in AD

A

Departments in the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User Rights

A

Permissions assigned to a given user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Groups

A

Collection of users based on common attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

chmod

A

Program in Linux that is used to change the permissions or rights of a file or folder using a shorthand number system (Read=4, Write=2, Execute=1)

17
Q

Privilege Creep

A

Occurs when a user get additional permission over time as they rotate through different positions or roles

18
Q

User Access Recertification

A

Process where each user’s rights and permissions are revalidated to ensure they are correct

19
Q

Inheritance

A

Happens by default; permissions are inherited from the folder above it

20
Q

Propagation

A

Occurs when permissions are passed to a subfolder from the parent through inheritance

21
Q

Keeping passwords secure best practice

A

change default

require the password is changed frequently (every 90 days)

always change the default Administrator or Root password

Disable the guest account on your systems

Enable Ctrl+alt+delete for logging into the system

use good, strong policies in regards to your passwords