6.1 Access Control Models

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

How do separation of duties and job rotation differ?

- Separation of duties is the concept of having more than one person required to complete a task. Two operators must review and approve each others work. - Job Rotation is the practice of cross-training in multiple job positions. Job rotation helps in detecting fraud, allow oversight of past transactions and training purposes.

Subjects

Subjects are users, applications, or processes that need access to objects.

Audit trails produced by auditing activities are which type of security control? - Deterrent - Detective - Directive - Preventative

Detective

Objects

Objects are data, applications, systems, networks, and physical space.

You have implemented an access control method that only allows users who are managers to access specific data. Which type of access control model is being used? - MAC - DACL - RBAC - DAC

RBAC

Which of the following is an example of rule-based access control? - A subject with a government clearance that allows access to government classification labels of Confidential, Secret, and Top Secret. - A member of the accounting team that is given access to the accounting department documents. - Router access control lists that allow or deny traffic based on the characteristics of an IP packet. - A computer file owner who grants access to the file by adding other users to an access control list.

Router access control lists that allow or deny traffic based on the characteristics of an IP packet.

How are rule-based access control and mandatory access control (MAC) similar?

A rule based access control can be seen as a mandatory access control as they do not consider the identity of the subject.

Access control

Access control is the ability to permit or deny access to resources on a network or computer.

Access control policy

An access control policy defines the steps and measures that are taken to control access to objects.

Access control system

An access control system includes policies, procedures, and technologies that are implemented to control access to objects.

Which access control model is based on assigning attributes to objects and using Boolean logic to grant access based on the attributes of the subject? - Mandatory Access Control (MAC) - Role-Based Access Control (RBAC) - Attribute-Based Access Control (ABAC) - Rule-Based Access Control

Attribute-Based Access Control (ABAC)

Auditing

Auditing, also referred to as accounting, is maintaining a record of the activity within the information system.

A remote access user needs to gain access to resources on the server. Which of the following processes are performed by the remote access server to control access to resources? - Authorization and accounting - Authentication and accounting - Identity proofing and authentication - Authentication and authorization - Identity proofing and authorization

Authentication and authorization

Authentication

Authentication is the process of validating identity. It includes the identification process, a user providing input to prove identity, and the system accepting that input as valid.

Authorization

Authorization is granting or denying access to an object based on the level of permissions or the actions allowed with the object.

You want to implement an access control list in which only the users you specifically authorize have access to the resource. Anyone not on the list should be prevented from having access. Which of the following methods of access control should the access list use? - Implicit allow, implicit deny - Implicit allow, explicit deny - Explicit allow, implicit deny - Explicit allow, explicit deny

Explicit allow, implicit deny

What is access control and why is it important?

Is the ability to permit or deny the privileges that a user has when accessing resources on a network or computer. This will allow you to control where a user can go in the network making it more secure.

Which authentication type requires you to prove your identity?

Multi-Factor Authenication.

Which of the following principles is implemented in a mandatory access control model to determine object access by classification level? - Principle of least privilege - Ownership - Need to Know - Clearance - Separation of duties

Need to Know

What is the primary purpose of separation of duties? - Increase the difficulty of performing administrative duties - Grant a greater range of control to senior management - Inform managers that they are not trusted - Prevent conflicts of interest

Prevent conflicts of interest

You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with? - Principle of least privilege - Need to know - Job rotation - Cross-training

Principle of least privilege

Which of the following is an example of privilege escalation? - Principle of least privilege - Privilege creep - Separation of duties - Mandatory vacations

Privilege creep

How does role-based control differ from rule-based control?

Rule base does not care who the user is unlike role based.

Which of the following is used for identification? - PIN - Username - Cognitive question - Password

Username


संबंधित स्टडी सेट्स

Financial Accounting Module 6 - Analyzing Financial Statements

View Set

Chapter 1: ENV Problems, Their Causes, and Sustainability

View Set

BISC 104 Mastering Biology Chapter 7

View Set

ECONOMICS-UNIT 1 QUIZ 3 & practice test

View Set