Security Module 11 Flashcards
What does using ‘least privilege’ model accomplish?
It Limits attack surface.
On Windows systems, a security identifier is a unique variable directly linked to which of the following?
Integrity Level
Which of the following directory access protocols is designed to run over a TCP/IP network?
LDAP
Mandatory vacations help organizations unearth which of the following?
Repetitious fraud exposure
Why is DAC considered a weaker defense than MAC?
DAC relies on the end-user to secure data
How does the Bell-LaPadula model differ from the lattice model?
Bell-LaPadula does not allow creation of objects at lower levels
Which of the following is NOT an advantage of job rotation?
Assurance that users operate with minimal privileges
Which of the following is not a service provided by an AAA server?
Autonomy
Which of the following is NOT considered a role in access control?
Conservator
How does UAC protect a system from being compromised?
UAC requires a higher-level administrative password
Which of the following is the oldest form of access control specifically used by UNIX systems?
ACL
Which of the following can prevent orphanged accounts form remaining a threat?
Account expiration
How are roles dissimilar to groups?
A user can only be assigned one role
If a service account is used by an automated system to create and delete files based on certain criteria, that service account is an example of which of the following?
Subject
A Windows-based ACE includes an access mask that specifies the access rights guarded by the ACE. When is this mask used to request access rights?
When an object is opened