Deck 9: Access Control Management

Full screen (f)
exit full mode
Question
Which of the following refers to security features that govern how users and processes communicate and interact with systems and resources?

A) Security posture
B) Access controls
C) Secure authentication
D) Identity management
Use Space or
up arrow
down arrow
to flip the card.
Question
Which common attribute of all access controls is used to identify unique records in a set, such as a username?

A) Identification scheme
B) Authentication method
C) Authorization model
D) None of the above
Question
Using a smartcard and a one-time passcode is an example of which of the following authentication methods?

A) Single-factor authentication
B) Multifactor authentication
C) Multilayer authentication
D) Cognitive password authentication
Question
Which of the following is not an example of authentication by knowledge?

A) Cognitive password
B) PIN
C) One-time passcode
D) Password
Question
Which of the following is an access control that is based on a specific job role or function?

A) Mandatory access control
B) Discretionary access control
C) Role-based access control
D) Rule-based access control
Question
Providing your mother's maiden name as verification is an example of which of the following?

A) Multilayer authentication
B) One-time passcode
C) Multifactor authentication
D) Cognitive password
Question
Which of the following is an example of authentication by characteristic?

A) Smartcard
B) Fingerprint scan
C) One-time passcode
D) Cognitive password
Question
Which of the following statements best describes object capability?

A) Mandatory access controls embedded in object and subject properties
B) Used to determine access based on a combination of specific criteria
C) Used programmatically and based on a combination of an unforgettable reference and an operational message
D) The process of assigning authenticated subjects permission to carry out a specific task
Question
Which of the following network types is a segment of the internal network that requires a high degree of protection?

A) Enclave network
B) Trusted network
C) DMZ
D) Guest network
Question
The Internet is an example of which of the following network types?

A) Guest network
B) Untrusted network
C) Enclave network
D) DMZ
Question
Which of the following best describes a firewall?

A) Passive device that analyzes network traffic to detect unauthorized access
B) Active device that sits inline with traffic and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D) A device that monitors the characteristics of a single host and the events occurring on that host
Question
Which of the following best describes an intrusion prevention system?

A) Passive device that analyzes network traffic to detect unauthorized access
B) Active device that sits inline with traffic flow and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D) A device that monitors the characteristics of a single host and the events occurring on that host
Question
Which of the following is the most dangerous and unwanted IDS/IPS decision state?

A) False positive
B) False negative
C) True positive
D) True negative
Question
Which of the following provides a secure tunnel for transmitting data through an insecure network such as the Internet?

A) Remote access portal
B) DMZ
C) Network access control system
D) Virtual private network
Question
Which of the following provides access to one or more applications through a single centralized interface?

A) Remote access portal
B) Virtual private network
C) DMZ
D) Network access control system
Question
Which of the following statements best describes an administrative account control called dual control?

A) Two individuals complete the same task simultaneously.
B) No one individual can control a process from start to finish.
C) Two individuals must both complete their half of a specific task.
D) Two individuals complete different tasks at the same time.
Question
Which of the following statements best describes segregation of duties?

A) Two individuals complete the same task simultaneously.
B) No one individual can control a process from start to finish.
C) Two individuals must both complete their half of a specific task.
D) Two individuals complete different tasks at the same time.
Question
Using a palm scan for authentication is an example of which of the following?

A) Authentication by knowledge
B) Authentication by ownership
C) Authentication by characteristic
D) Authentication by possession
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Access Control Management
1
Which of the following refers to security features that govern how users and processes communicate and interact with systems and resources?

A) Security posture
B) Access controls
C) Secure authentication
D) Identity management
Access controls
2
Which common attribute of all access controls is used to identify unique records in a set, such as a username?

A) Identification scheme
B) Authentication method
C) Authorization model
D) None of the above
Identification scheme
3
Using a smartcard and a one-time passcode is an example of which of the following authentication methods?

A) Single-factor authentication
B) Multifactor authentication
C) Multilayer authentication
D) Cognitive password authentication
Multilayer authentication
4
Which of the following is not an example of authentication by knowledge?

A) Cognitive password
B) PIN
C) One-time passcode
D) Password
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is an access control that is based on a specific job role or function?

A) Mandatory access control
B) Discretionary access control
C) Role-based access control
D) Rule-based access control
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
Providing your mother's maiden name as verification is an example of which of the following?

A) Multilayer authentication
B) One-time passcode
C) Multifactor authentication
D) Cognitive password
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is an example of authentication by characteristic?

A) Smartcard
B) Fingerprint scan
C) One-time passcode
D) Cognitive password
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following statements best describes object capability?

A) Mandatory access controls embedded in object and subject properties
B) Used to determine access based on a combination of specific criteria
C) Used programmatically and based on a combination of an unforgettable reference and an operational message
D) The process of assigning authenticated subjects permission to carry out a specific task
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following network types is a segment of the internal network that requires a high degree of protection?

A) Enclave network
B) Trusted network
C) DMZ
D) Guest network
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
The Internet is an example of which of the following network types?

A) Guest network
B) Untrusted network
C) Enclave network
D) DMZ
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following best describes a firewall?

A) Passive device that analyzes network traffic to detect unauthorized access
B) Active device that sits inline with traffic and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D) A device that monitors the characteristics of a single host and the events occurring on that host
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following best describes an intrusion prevention system?

A) Passive device that analyzes network traffic to detect unauthorized access
B) Active device that sits inline with traffic flow and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D) A device that monitors the characteristics of a single host and the events occurring on that host
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is the most dangerous and unwanted IDS/IPS decision state?

A) False positive
B) False negative
C) True positive
D) True negative
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following provides a secure tunnel for transmitting data through an insecure network such as the Internet?

A) Remote access portal
B) DMZ
C) Network access control system
D) Virtual private network
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following provides access to one or more applications through a single centralized interface?

A) Remote access portal
B) Virtual private network
C) DMZ
D) Network access control system
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following statements best describes an administrative account control called dual control?

A) Two individuals complete the same task simultaneously.
B) No one individual can control a process from start to finish.
C) Two individuals must both complete their half of a specific task.
D) Two individuals complete different tasks at the same time.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following statements best describes segregation of duties?

A) Two individuals complete the same task simultaneously.
B) No one individual can control a process from start to finish.
C) Two individuals must both complete their half of a specific task.
D) Two individuals complete different tasks at the same time.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
Using a palm scan for authentication is an example of which of the following?

A) Authentication by knowledge
B) Authentication by ownership
C) Authentication by characteristic
D) Authentication by possession
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.