Security 6.4 Flashcards

1
Q

Authentication

A

proving that a subject is who they claim to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorization

A

determine what rights or permissions subjects should have on each resource and enforcing those rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accounting

A

tracking authorized and unauthorized usage of a resource or use of rights by a subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Single Factor

A

1 item of authentication

EX. using 1 aspect for instance something you know like a pin and passowrd, or something you have hardware/software token, where you are, who you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A.C.L.

A

Access Control List

List of subjects and the rights or permissions they have been granted on the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Something you know of Authentication factors

A

Pin and Password, Security Question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Something you have of Authentication Types

A

One-Time Password, Software Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who you are type of Authentication

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Role Based Access

A

set of roles are defined and users allocated to those roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Discretionary Access Control

A

The owner is the original creator of the resource.

Granted full control over the resource, can modify its access control list to grant rights to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mandatory Access Control

A

Based on security clearance levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rule Based access control

A

refers to any sort of access control model where access control policies are determined by system enforced rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

User Account Types

A

ensures the identity of someone using a computer is validated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which non-repudiation mechanism can prove that a person was genuinely operating an account and that it was not hijacked?

A

biometric authentication device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which non-repudiation mechanism can prove that the user was an author of a document?

A

A physical or digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does RSA’s SecurID token provide multi-factor authentication?

A

It generates a number code synchronized to a code on a server and is combined with a PIN.

17
Q

Which non-repudiation mechanism records who goes in or out of a particular area without user interaction?

A

A video surveillance camera

18
Q

Which of the following describes Discretionary Access Control (DAC)?

A

An authorization access model that stresses the importance of the owner who has full control over the resource

19
Q

What is the authorization concept known as implicit deny?

A

A principle stating that access requires explicit authorization and everything else is rejected

20
Q

Logging events in an audit log is what part of the access control system?

A

Accounting

21
Q

Which non-repudiation mechanism can prove that a person was genuinely operating an account and that it was not hijacked?

A

A biometric authentication device

22
Q

What service must be enabled for you to log on to multiple resources, servers, or sites using a common account and password?

A

Single Sign On

23
Q

Which of the following is a common concern regarding the accuracy of biometrics?

A

The false-negative and false-positive rate

24
Q

What is the purpose of authorization?

A

To ensure that the person has the right to access a file or perform an action

25
Q

A passphrase is a longer version of which factor of authentication?

A

A password

26
Q

What is rule-based access control?

A

An authorization access model in which access is based on policies that are non-discretionary

27
Q

Which factor of authentication can be stolen and replayed from a remote location?

A

A software token

think something you have

28
Q

What information can be used as a response to a security question?

A

Personally Identifiable Information (PII)

29
Q

Which non-repudiation mechanism can prove that the user was an author of a document?

A

A physical or digital signature