Deck 9: Access Control Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
Play
Full screen (f)
Deck 9: Access Control Management
1
Which of the following refers to security features that govern how users and processes communicate and interact with systems and resources?
A) Security posture
B) Access controls
C) Secure authentication
D) Identity management
A) Security posture
B) Access controls
C) Secure authentication
D) Identity management
Access controls
2
Which common attribute of all access controls is used to identify unique records in a set, such as a username?
A) Identification scheme
B) Authentication method
C) Authorization model
D) None of the above
A) Identification scheme
B) Authentication method
C) Authorization model
D) None of the above
Identification scheme
3
Using a smartcard and a one-time passcode is an example of which of the following authentication methods?
A) Single-factor authentication
B) Multifactor authentication
C) Multilayer authentication
D) Cognitive password authentication
A) Single-factor authentication
B) Multifactor authentication
C) Multilayer authentication
D) Cognitive password authentication
Multilayer authentication
4
Which of the following is not an example of authentication by knowledge?
A) Cognitive password
B) PIN
C) One-time passcode
D) Password
A) Cognitive password
B) PIN
C) One-time passcode
D) Password
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is an access control that is based on a specific job role or function?
A) Mandatory access control
B) Discretionary access control
C) Role-based access control
D) Rule-based access control
A) Mandatory access control
B) Discretionary access control
C) Role-based access control
D) Rule-based access control
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
Providing your mother's maiden name as verification is an example of which of the following?
A) Multilayer authentication
B) One-time passcode
C) Multifactor authentication
D) Cognitive password
A) Multilayer authentication
B) One-time passcode
C) Multifactor authentication
D) Cognitive password
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is an example of authentication by characteristic?
A) Smartcard
B) Fingerprint scan
C) One-time passcode
D) Cognitive password
A) Smartcard
B) Fingerprint scan
C) One-time passcode
D) Cognitive password
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following statements best describes object capability?
A) Mandatory access controls embedded in object and subject properties
B) Used to determine access based on a combination of specific criteria
C) Used programmatically and based on a combination of an unforgettable reference and an operational message
D) The process of assigning authenticated subjects permission to carry out a specific task
A) Mandatory access controls embedded in object and subject properties
B) Used to determine access based on a combination of specific criteria
C) Used programmatically and based on a combination of an unforgettable reference and an operational message
D) The process of assigning authenticated subjects permission to carry out a specific task
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following network types is a segment of the internal network that requires a high degree of protection?
A) Enclave network
B) Trusted network
C) DMZ
D) Guest network
A) Enclave network
B) Trusted network
C) DMZ
D) Guest network
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
The Internet is an example of which of the following network types?
A) Guest network
B) Untrusted network
C) Enclave network
D) DMZ
A) Guest network
B) Untrusted network
C) Enclave network
D) DMZ
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following best describes a firewall?
A) Passive device that analyzes network traffic to detect unauthorized access
B) Active device that sits inline with traffic and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D) A device that monitors the characteristics of a single host and the events occurring on that host
A) Passive device that analyzes network traffic to detect unauthorized access
B) Active device that sits inline with traffic and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D) A device that monitors the characteristics of a single host and the events occurring on that host
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following best describes an intrusion prevention system?
A) Passive device that analyzes network traffic to detect unauthorized access
B) Active device that sits inline with traffic flow and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D) A device that monitors the characteristics of a single host and the events occurring on that host
A) Passive device that analyzes network traffic to detect unauthorized access
B) Active device that sits inline with traffic flow and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D) A device that monitors the characteristics of a single host and the events occurring on that host
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is the most dangerous and unwanted IDS/IPS decision state?
A) False positive
B) False negative
C) True positive
D) True negative
A) False positive
B) False negative
C) True positive
D) True negative
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following provides a secure tunnel for transmitting data through an insecure network such as the Internet?
A) Remote access portal
B) DMZ
C) Network access control system
D) Virtual private network
A) Remote access portal
B) DMZ
C) Network access control system
D) Virtual private network
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following provides access to one or more applications through a single centralized interface?
A) Remote access portal
B) Virtual private network
C) DMZ
D) Network access control system
A) Remote access portal
B) Virtual private network
C) DMZ
D) Network access control system
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following statements best describes an administrative account control called dual control?
A) Two individuals complete the same task simultaneously.
B) No one individual can control a process from start to finish.
C) Two individuals must both complete their half of a specific task.
D) Two individuals complete different tasks at the same time.
A) Two individuals complete the same task simultaneously.
B) No one individual can control a process from start to finish.
C) Two individuals must both complete their half of a specific task.
D) Two individuals complete different tasks at the same time.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following statements best describes segregation of duties?
A) Two individuals complete the same task simultaneously.
B) No one individual can control a process from start to finish.
C) Two individuals must both complete their half of a specific task.
D) Two individuals complete different tasks at the same time.
A) Two individuals complete the same task simultaneously.
B) No one individual can control a process from start to finish.
C) Two individuals must both complete their half of a specific task.
D) Two individuals complete different tasks at the same time.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
Using a palm scan for authentication is an example of which of the following?
A) Authentication by knowledge
B) Authentication by ownership
C) Authentication by characteristic
D) Authentication by possession
A) Authentication by knowledge
B) Authentication by ownership
C) Authentication by characteristic
D) Authentication by possession
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck