Deck 2: Access Control

Full screen (f)
exit full mode
Question
A deny-by-default stance is less strict than an allow-by-default stance.
Use Space or
up arrow
down arrow
to flip the card.
Question
Knowledge factor authentication is also referred to as Type I authentication factor.
Question
Passwords are considered weaker than passphrases.
Question
Smart cards are less expensive to implement than memory cards.
Question
Retina scans have a higher accuracy than any other biometric scan.
Question
Type I errors are more dangerous than Type II errors.
Question
When considering FAR, FRR, and CER, smaller values are better.
Question
Content-dependent access control is based on subject or object attributes or environmental characteristics.
Question
A network-based IDS is the most common IDS and monitors network traffic on a local network segment.
Question
Pharming and phishing are password attacks.
Question
Which concept ensures that data is protected from unauthorized modification or data corruption?

A) Confidentiality
B) Integrity
C) Availability
D) Identification
Question
Which of the following is an example of three-factor authentication?

A) Username, password, smart card
B) Password, smart card, PIN
C) Password, smart card, iris scan
D) Smart card, iris scan, keystroke dynamics
Question
Of the options given, which biometric consideration is MOST important?

A) FAR
B) Enrollment time
C) Throughput rate
D) FRR
Question
What defines the method for identifying and authenticating users and the level of access that is granted to users?

A) Least privilege
B) Dual controls
C) Separation of duties
D) Access control policy
Question
Which accountability mechanism reviews facility and perimeter protections?

A) Physical vulnerability assessment
B) Personnel vulnerability assessment
C) Clipping level
D) Blind test
Question
In which access control category do fire extinguishers fall?

A) Detective
B) Corrective
C) Preventive
D) Compensative
Question
Which of the following are physical access controls?

A) Security policies
B) Baselines
C) Badges
D) Audit trails
Question
In which access control model is all that is not expressly permitted is forbidden?

A) MAC
B) RBAC
C) Rule-based access control
D) DAC
Question
Which type of IDS analyzes traffic and compares it to normal traffic to determine whether said traffic is a threat?

A) Anomaly-based
B) Signature-based
C) Rule-based
D) Pattern-matching
Question
Which malicious software collects private user data?

A) Virus
B) Spyware
C) Worm
D) Trojan horse
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Access Control
1
A deny-by-default stance is less strict than an allow-by-default stance.
False
2
Knowledge factor authentication is also referred to as Type I authentication factor.
True
3
Passwords are considered weaker than passphrases.
True
4
Smart cards are less expensive to implement than memory cards.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Retina scans have a higher accuracy than any other biometric scan.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
Type I errors are more dangerous than Type II errors.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
When considering FAR, FRR, and CER, smaller values are better.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Content-dependent access control is based on subject or object attributes or environmental characteristics.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
A network-based IDS is the most common IDS and monitors network traffic on a local network segment.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
Pharming and phishing are password attacks.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Which concept ensures that data is protected from unauthorized modification or data corruption?

A) Confidentiality
B) Integrity
C) Availability
D) Identification
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is an example of three-factor authentication?

A) Username, password, smart card
B) Password, smart card, PIN
C) Password, smart card, iris scan
D) Smart card, iris scan, keystroke dynamics
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Of the options given, which biometric consideration is MOST important?

A) FAR
B) Enrollment time
C) Throughput rate
D) FRR
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
What defines the method for identifying and authenticating users and the level of access that is granted to users?

A) Least privilege
B) Dual controls
C) Separation of duties
D) Access control policy
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
Which accountability mechanism reviews facility and perimeter protections?

A) Physical vulnerability assessment
B) Personnel vulnerability assessment
C) Clipping level
D) Blind test
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
In which access control category do fire extinguishers fall?

A) Detective
B) Corrective
C) Preventive
D) Compensative
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following are physical access controls?

A) Security policies
B) Baselines
C) Badges
D) Audit trails
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
In which access control model is all that is not expressly permitted is forbidden?

A) MAC
B) RBAC
C) Rule-based access control
D) DAC
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which type of IDS analyzes traffic and compares it to normal traffic to determine whether said traffic is a threat?

A) Anomaly-based
B) Signature-based
C) Rule-based
D) Pattern-matching
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Which malicious software collects private user data?

A) Virus
B) Spyware
C) Worm
D) Trojan horse
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.