Security+ Flashcards

Security+ flash cards

107 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Which of the following are not valid access control mechanisms? A. MAC B. SAC C. DAC D. RBAC
B. SAC
Access control mechanism in which access is granted based on the responsibilities an individual user or process has in an organization? A. MAC B. SAC C. DAC D. RBAC
D. RBAC (Role Based Access Control)
Access control mechanism that allows the data owner to create and administer access control? A. MAC B. SAC C. DAC D. RBAC
C. DAC (Discretionary Access Control)
What is the primary flaw in the DAC model?
DAC (Discretionary Access Control) relies on the ID of the user or process, leaving room for a Trojan Horse.
Which Access Control methods provide the most granular access to objects? A. Capabilities B. Access Control Lists C. Permission bits D. Profiles
B. Access Control Lists
Owner: Read, Write, Execute, User A: Read, Write. User B: none Sales: Read Marketing: Read, Write. User B is in Sales, what effective perms does he have?
User B has no permissions on the file. Individual permissions override group permissions.
Which are examples of RBAC? A. File, Printer, mailbox roles B. Sales, marketing, production C. User and workstation access roles
B. Sales, marketing, and production
With DAC access controls each object has an owner, which has full control over the object. (True or False)
True
Which of the following are used to make access decisions in MAC? A. Access Control Lists B. Ownership C. Group Membership D. Sensitivity Labels
D. Sensitivity Labels
Which Access Control methods allow access control based on security labels associated with each data item and each user? A. MAC B. RBAC C. DAC D. SAC
A. MAC (Mandatory Access Control)
Which access control method relies on user security clearance and data classification? A. MAC B. RBAC C. DAC D. SAC
A. MAC (Mandatory Access Control)
One characteristic of MAC is that it uses levels of security to classify users and data. (True/False)
True
Which of the following terms best represents MAC? A. Lattice B. Bell La-Padula C. BIBA D. Clark and Wilson
A. Lattice
Which of the following passwords generators is based on challenge-response? A) asymmetric B) symmetric C) cryptographic keys D) smart cards
A) asymmetric
Which password system provides for large numbers of users? A) self service password resets B) locally saved passwords C) multiple access methods
A) self service password resets