Explain the Access Control Model Flashcards

Security + Ex am Prepa

51 cards   |   Total Attempts: 182
  

Cards In This Set

Front Back
Most key fob identification systems use which of the following types of authentication mechanisms?
Token
Which access control method gives the owner control over providing permissions?
Discretionary Access Control (DAC)
Choose the terminology or concept which best describes a (Mandatory Access Control) MAC model.
Lattice
Which of the following access control models uses roles to determine access permissions?
RBAC
Which of the following access decisions are based on a Mandatory Access control (MAC) environment?
Sensitivity labels
Which of the following types of authentication BEST describes providing a username, password and undergoing a thumb print scan to access a workstation?
Multifactor
The ability to logon to multiple systems with the same credentials is typically known as:
Single sign-on
Which security measure should be used while implementing access control?
Password complexity requirements
Which of the following is correct about an instance where a biometric system identifies unauthorized users and allows them access?
False acceptance
Which of the following authentication methods increases the security o the authentication process because it must be in your physical possession?
Smart Cards
Which password management system best provides for a system with a large number of users?
Self service password reset management systems
Who is responsible for establishing access permissions to network resources in the Discretionary Access Control (DAC) access control model?
The owner of the resource
The DAC (Discretionary Access Control) model has an inherent flaw. Choose the option that describes this flaw.
The DAC (Discretionary Access Control) model uses only the identity of the user or specific process to control access to a resource. This creates a security loophole for Trojan horse attacks.
Which of the following access control models uses subject and object labels?
Mandatory Access Control (MAC)
Which of the following will restrict access to files according to the identity of the user or group?
DAC