Security Module 11 Flashcards

1
Q

What does using ‘least privilege’ model accomplish?

A

It Limits attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

On Windows systems, a security identifier is a unique variable directly linked to which of the following?

A

Integrity Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following directory access protocols is designed to run over a TCP/IP network?

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mandatory vacations help organizations unearth which of the following?

A

Repetitious fraud exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is DAC considered a weaker defense than MAC?

A

DAC relies on the end-user to secure data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does the Bell-LaPadula model differ from the lattice model?

A

Bell-LaPadula does not allow creation of objects at lower levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is NOT an advantage of job rotation?

A

Assurance that users operate with minimal privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is not a service provided by an AAA server?

A

Autonomy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is NOT considered a role in access control?

A

Conservator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does UAC protect a system from being compromised?

A

UAC requires a higher-level administrative password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the oldest form of access control specifically used by UNIX systems?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following can prevent orphanged accounts form remaining a threat?

A

Account expiration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are roles dissimilar to groups?

A

A user can only be assigned one role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If a service account is used by an automated system to create and delete files based on certain criteria, that service account is an example of which of the following?

A

Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Windows-based ACE includes an access mask that specifies the access rights guarded by the ACE. When is this mask used to request access rights?

A

When an object is opened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following can NOT be configured through a Group Policy Object?

A

Changing an ACL configuration on switches

17
Q

Rule Based Access Control can NOT be based off of which criteria?

A

User

18
Q

Orphaned accounts and dormant accounts are security risks that differ at what capacity?

A

Dormant accounts have not been accessed for a lengthy duration

19
Q

How are ACLs limited in functionality?

A

ACLs are not efficient

20
Q

When a user logs in to a computer with their username and password, those credentials are valitated through a user management database. This is an example of which of the following?

A

Authentication