Deck 9: Access Control Fundamentals

ملء الشاشة (f)
exit full mode
سؤال
The most restrictive access control model is ____.

A) Mandatory Access Control
B) Role Based Access Control
C) Discretionary Access Control
D) Rule Based Access Control
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A user accessing a computer system must present credentials or ____ when logging on to the system.

A) access
B) authorize
C) token
D) identification
سؤال
The action that is taken by the subject over the object is called a(n) ____.

A) authorization
B) access
C) control
D) operation
سؤال
____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.

A) Separation of duties
B) Job rotation
C) Mandatory vacation
D) Role reversal
سؤال
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.

A) RADIUS
B) ICMP
C) FTP
D) Telnet
سؤال
TACACS+ and RADIUS are designed to support hundreds of remote connections.
سؤال
A(n) ____ is a set of permissions that are attached to an object.

A) ACE
B) DAC
C) entity
D) ACL
سؤال
A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources.
سؤال
The ____ model is the least restrictive.

A) RBAC
B) MAC
C) CAC
D) DAC
سؤال
A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.

A) subject
B) reference monitor
C) entity
D) label
سؤال
Authorization and access are viewed as synonymous and in access control, they are the same step.
سؤال
____ is considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.

A) Role Based Access Control
B) Rule Based Access Control
C) Discretionary Access Control
D) Mandatory Access Control
سؤال
The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server.
سؤال
In the UAC dialog boxes, the color ____ indicates the lowest risk.

A) red
B) gray
C) yellow
D) green
سؤال
____ indicates when an account is no longer active.

A) Password expiration
B) Account expiration
C) Last login
D) Account last used
سؤال
A user under Role Based Access Control can be assigned only one ____.

A) role
B) group
C) label
D) access list
سؤال
A(n) ____ model is a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.

A) accounting
B) user control
C) access control
D) authorization control
سؤال
____ accounts are user accounts that remain active after an employee has left an organization.

A) Active
B) Stale
C) Orphaned
D) Fragmented
سؤال
A shield icon warns users if they attempt to access any feature that requires UAC permission.
سؤال
____ is often used for managing user access to one or more systems.

A) Role Based Access Control
B) Mandatory Access Control
C) Rule Based Access Control
D) Discretionary Access Control
سؤال
____________________ is granting or denying approval to use specific resources.
سؤال
List two of the most common types of authentication and AA servers.
سؤال
List the steps for RADIUS authentication with a wireless device in an IEEE 802.1x network.
سؤال
____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.

A) Aurora
B) Kerberos
C) CHAP
D) TACACS
سؤال
____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.

A) TACACS
B) RADIUS
C) Kerberos
D) FTP
سؤال
During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____.

A) accounting request
B) access request
C) verification request
D) authentication request
سؤال
A RADIUS ____________________ is a computer that forwards RADIUS messages among RADIUS clients and RADIUS servers.
سؤال
Describe the two key elements of the MAC model.
سؤال
Describe the Bell-LaPadula model.
سؤال
Describe how Kerberos works.
سؤال
List two major access control models.
سؤال
The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.

A) DIB
B) DAP
C) DIT
D) LDAP
سؤال
Entries in the DIB are arranged in a tree structure called the ____.

A) DAP
B) PEAP
C) EAP
D) DIT
سؤال
In the DAC model, ____________________ can create and access their objects freely.
سؤال
Often ____________________ results from a single user being trusted with a set of responsibilities that place the person in complete control of the process.
سؤال
____ attacks may allow an attacker to construct LDAP statements based on user input statements.

A) SQL injection
B) Kerberos injection
C) LDAP injection
D) RADIUS injection
سؤال
The capability to look up information by name under the X.500 standard is known as a(n) ____________________-pages service.
سؤال
Describe the MAC lattice model.
سؤال
Discuss the two significant weaknesses of DAC.
سؤال
Describe LDAP injection attacks.
سؤال
Discuss the differences between DAP and LDAP.
سؤال
Match between columns
A database stored on the network itself that contains information about users and network devices
Authorization
A database stored on the network itself that contains information about users and network devices
Owner
A database stored on the network itself that contains information about users and network devices
Identification
A database stored on the network itself that contains information about users and network devices
Authentication
A database stored on the network itself that contains information about users and network devices
Access
A database stored on the network itself that contains information about users and network devices
Object
A database stored on the network itself that contains information about users and network devices
Custodian
A database stored on the network itself that contains information about users and network devices
End user
A database stored on the network itself that contains information about users and network devices
Directory service
The right given to access
Authorization
The right given to access
Owner
The right given to access
Identification
The right given to access
Authentication
The right given to access
Access
The right given to access
Object
The right given to access
Custodian
The right given to access
End user
The right given to access
Directory service
Validating credentials as genuine
Authorization
Validating credentials as genuine
Owner
Validating credentials as genuine
Identification
Validating credentials as genuine
Authentication
Validating credentials as genuine
Access
Validating credentials as genuine
Object
Validating credentials as genuine
Custodian
Validating credentials as genuine
End user
Validating credentials as genuine
Directory service
Granting permission to take an action
Authorization
Granting permission to take an action
Owner
Granting permission to take an action
Identification
Granting permission to take an action
Authentication
Granting permission to take an action
Access
Granting permission to take an action
Object
Granting permission to take an action
Custodian
Granting permission to take an action
End user
Granting permission to take an action
Directory service
A specific resource, such as a file or a hardware device
Authorization
A specific resource, such as a file or a hardware device
Owner
A specific resource, such as a file or a hardware device
Identification
A specific resource, such as a file or a hardware device
Authentication
A specific resource, such as a file or a hardware device
Access
A specific resource, such as a file or a hardware device
Object
A specific resource, such as a file or a hardware device
Custodian
A specific resource, such as a file or a hardware device
End user
A specific resource, such as a file or a hardware device
Directory service
A review of credentials
Authorization
A review of credentials
Owner
A review of credentials
Identification
A review of credentials
Authentication
A review of credentials
Access
A review of credentials
Object
A review of credentials
Custodian
A review of credentials
End user
A review of credentials
Directory service
Individual to whom day-to-day actions have been assigned
Authorization
Individual to whom day-to-day actions have been assigned
Owner
Individual to whom day-to-day actions have been assigned
Identification
Individual to whom day-to-day actions have been assigned
Authentication
Individual to whom day-to-day actions have been assigned
Access
Individual to whom day-to-day actions have been assigned
Object
Individual to whom day-to-day actions have been assigned
Custodian
Individual to whom day-to-day actions have been assigned
End user
Individual to whom day-to-day actions have been assigned
Directory service
User who accesses information in the course of routine job responsibilities
Authorization
User who accesses information in the course of routine job responsibilities
Owner
User who accesses information in the course of routine job responsibilities
Identification
User who accesses information in the course of routine job responsibilities
Authentication
User who accesses information in the course of routine job responsibilities
Access
User who accesses information in the course of routine job responsibilities
Object
User who accesses information in the course of routine job responsibilities
Custodian
User who accesses information in the course of routine job responsibilities
End user
User who accesses information in the course of routine job responsibilities
Directory service
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Access Control Fundamentals
1
The most restrictive access control model is ____.

A) Mandatory Access Control
B) Role Based Access Control
C) Discretionary Access Control
D) Rule Based Access Control
A
2
A user accessing a computer system must present credentials or ____ when logging on to the system.

A) access
B) authorize
C) token
D) identification
D
3
The action that is taken by the subject over the object is called a(n) ____.

A) authorization
B) access
C) control
D) operation
D
4
____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.

A) Separation of duties
B) Job rotation
C) Mandatory vacation
D) Role reversal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.

A) RADIUS
B) ICMP
C) FTP
D) Telnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
TACACS+ and RADIUS are designed to support hundreds of remote connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
A(n) ____ is a set of permissions that are attached to an object.

A) ACE
B) DAC
C) entity
D) ACL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
A computer user may be authorized or granted permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user can then access any and all resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ____ model is the least restrictive.

A) RBAC
B) MAC
C) CAC
D) DAC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.

A) subject
B) reference monitor
C) entity
D) label
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
Authorization and access are viewed as synonymous and in access control, they are the same step.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ is considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.

A) Role Based Access Control
B) Rule Based Access Control
C) Discretionary Access Control
D) Mandatory Access Control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
The strength of RADIUS is that messages are always directly sent between the wireless device and the RADIUS server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
In the UAC dialog boxes, the color ____ indicates the lowest risk.

A) red
B) gray
C) yellow
D) green
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ indicates when an account is no longer active.

A) Password expiration
B) Account expiration
C) Last login
D) Account last used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
A user under Role Based Access Control can be assigned only one ____.

A) role
B) group
C) label
D) access list
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
A(n) ____ model is a standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.

A) accounting
B) user control
C) access control
D) authorization control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ accounts are user accounts that remain active after an employee has left an organization.

A) Active
B) Stale
C) Orphaned
D) Fragmented
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
A shield icon warns users if they attempt to access any feature that requires UAC permission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
____ is often used for managing user access to one or more systems.

A) Role Based Access Control
B) Mandatory Access Control
C) Rule Based Access Control
D) Discretionary Access Control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
____________________ is granting or denying approval to use specific resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
List two of the most common types of authentication and AA servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
List the steps for RADIUS authentication with a wireless device in an IEEE 802.1x network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.

A) Aurora
B) Kerberos
C) CHAP
D) TACACS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
____ is an authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.

A) TACACS
B) RADIUS
C) Kerberos
D) FTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
During RADIUS authentication the AP, serving as the authenticator that will accept or reject the wireless device, creates a data packet from this information called the ____.

A) accounting request
B) access request
C) verification request
D) authentication request
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
A RADIUS ____________________ is a computer that forwards RADIUS messages among RADIUS clients and RADIUS servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Describe the two key elements of the MAC model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Describe the Bell-LaPadula model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Describe how Kerberos works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
List two major access control models.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.

A) DIB
B) DAP
C) DIT
D) LDAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Entries in the DIB are arranged in a tree structure called the ____.

A) DAP
B) PEAP
C) EAP
D) DIT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
In the DAC model, ____________________ can create and access their objects freely.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
Often ____________________ results from a single user being trusted with a set of responsibilities that place the person in complete control of the process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
____ attacks may allow an attacker to construct LDAP statements based on user input statements.

A) SQL injection
B) Kerberos injection
C) LDAP injection
D) RADIUS injection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
The capability to look up information by name under the X.500 standard is known as a(n) ____________________-pages service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Describe the MAC lattice model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Discuss the two significant weaknesses of DAC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Describe LDAP injection attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Discuss the differences between DAP and LDAP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
A database stored on the network itself that contains information about users and network devices
Authorization
A database stored on the network itself that contains information about users and network devices
Owner
A database stored on the network itself that contains information about users and network devices
Identification
A database stored on the network itself that contains information about users and network devices
Authentication
A database stored on the network itself that contains information about users and network devices
Access
A database stored on the network itself that contains information about users and network devices
Object
A database stored on the network itself that contains information about users and network devices
Custodian
A database stored on the network itself that contains information about users and network devices
End user
A database stored on the network itself that contains information about users and network devices
Directory service
The right given to access
Authorization
The right given to access
Owner
The right given to access
Identification
The right given to access
Authentication
The right given to access
Access
The right given to access
Object
The right given to access
Custodian
The right given to access
End user
The right given to access
Directory service
Validating credentials as genuine
Authorization
Validating credentials as genuine
Owner
Validating credentials as genuine
Identification
Validating credentials as genuine
Authentication
Validating credentials as genuine
Access
Validating credentials as genuine
Object
Validating credentials as genuine
Custodian
Validating credentials as genuine
End user
Validating credentials as genuine
Directory service
Granting permission to take an action
Authorization
Granting permission to take an action
Owner
Granting permission to take an action
Identification
Granting permission to take an action
Authentication
Granting permission to take an action
Access
Granting permission to take an action
Object
Granting permission to take an action
Custodian
Granting permission to take an action
End user
Granting permission to take an action
Directory service
A specific resource, such as a file or a hardware device
Authorization
A specific resource, such as a file or a hardware device
Owner
A specific resource, such as a file or a hardware device
Identification
A specific resource, such as a file or a hardware device
Authentication
A specific resource, such as a file or a hardware device
Access
A specific resource, such as a file or a hardware device
Object
A specific resource, such as a file or a hardware device
Custodian
A specific resource, such as a file or a hardware device
End user
A specific resource, such as a file or a hardware device
Directory service
A review of credentials
Authorization
A review of credentials
Owner
A review of credentials
Identification
A review of credentials
Authentication
A review of credentials
Access
A review of credentials
Object
A review of credentials
Custodian
A review of credentials
End user
A review of credentials
Directory service
Individual to whom day-to-day actions have been assigned
Authorization
Individual to whom day-to-day actions have been assigned
Owner
Individual to whom day-to-day actions have been assigned
Identification
Individual to whom day-to-day actions have been assigned
Authentication
Individual to whom day-to-day actions have been assigned
Access
Individual to whom day-to-day actions have been assigned
Object
Individual to whom day-to-day actions have been assigned
Custodian
Individual to whom day-to-day actions have been assigned
End user
Individual to whom day-to-day actions have been assigned
Directory service
User who accesses information in the course of routine job responsibilities
Authorization
User who accesses information in the course of routine job responsibilities
Owner
User who accesses information in the course of routine job responsibilities
Identification
User who accesses information in the course of routine job responsibilities
Authentication
User who accesses information in the course of routine job responsibilities
Access
User who accesses information in the course of routine job responsibilities
Object
User who accesses information in the course of routine job responsibilities
Custodian
User who accesses information in the course of routine job responsibilities
End user
User who accesses information in the course of routine job responsibilities
Directory service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.