Term
PREVENTATIVE Access Controls |
|
Definition
Detur intrusion or attacks, Example:Seperation of duties |
|
|
Term
|
Definition
Objects are data applications, systems, networks, and physical space. |
|
|
Term
|
Definition
The process of validating a subject's identity. |
|
|
Term
TECHNICAL Access Controls |
|
Definition
Computer mechanisms that restrict access. Example: Encryption |
|
|
Term
|
Definition
Restrict or conrol physical access. |
|
|
Term
|
Definition
Related to things people know, such as mothers maden name. |
|
|
Term
What kind of password is marryhadalittlelamb? |
|
Definition
|
|
Term
Which of the following defines the CROSSOVER RATE for evaluating biometric systems? |
|
Definition
The point where the number of false positives matches the number of false negatives in a biometric systems. |
|
|
Term
What conditions are disirable when selecting a biomeric system? |
|
Definition
Low crossever error rate, and a high processing rate |
|
|
Term
|
Definition
When someone is denied access when they should be allowed access. |
|
|
Term
What should be done to a user account if the user goes on an extended vacation? |
|
Definition
|
|
Term
|
Definition
Devices Synchronized to an authentication server |
|
|
Term
What is a strong password? |
|
Definition
A strong password should not contain dictionary words or any part of the log in name. They should include upper case letters, numbrtd, snf dymbold. In addition, longer is better. |
|
|
Term
What kind of access controls should be used implement short term repairs to restore basic functionality after an attack? |
|
Definition
|
|
Term
Which of the following is an example of type 1 authentication? A. Smart card B. User name C. Passphrase D. Retina scan |
|
Definition
|
|
Term
You have just configured and set the password policy and set the minumum password age to 10. What will be the effect of this configuration? |
|
Definition
Users cannot change their password for 10 days. |
|
|
Term
You implemented account lockout with a clipping level of 4. What will be the effect of this setting? |
|
Definition
The account will be locked out after 4 incorrect attempts. |
|
|
Term
What is the best action taken after noticing a user has written their password down? |
|
Definition
Implement end-user training |
|
|
Term
What is the best way to dispose of data stored on CD-Rs? |
|
Definition
|
|
Term
What is the star property of Bell-Padula? |
|
Definition
|
|
Term
What is the Clark-Wilson model primarily based on? |
|
Definition
Controlled Intermediary access applications |
|
|
Term
The brewer-bash model is designed to prevent what? |
|
Definition
|
|
Term
Which access control model manages rights and permissions based on job descriptions and responsibilities? |
|
Definition
Mandatory Access Control (MAC) |
|
|
Term
What does the Mandatory Access Control (MAC) method use to control access? |
|
Definition
|
|
Term
Discretionary Access Control (DAC) Manages access resources using what primary element or aspect? |
|
Definition
|
|
Term
DAC (Discretionary Access Control) |
|
Definition
Uses Identities to control resource access. Users can define access controls to their owned resources. |
|
|
Term
What kind of access control focuses on assigning privlages based on security clearance and data sensitivity? |
|
Definition
MAC (Mandatory Access Control) |
|
|
Term
Which principles is implemented in a mandatory access control model to determine access to an object using classification levels? |
|
Definition
|
|
Term
NEED TO KNOW is required to access what types of resources? |
|
Definition
Compartmentalized resources |
|
|
Term
In what orm of access control enviroment is access controlled by rules rather than by identity? |
|
Definition
Mandatory Access Control (MAC) |
|
|
Term
What form of access control is based on job descriptions? |
|
Definition
Role Based access control (RBAC) |
|
|
Term
What are two examples of single sign-on authentication solutions? |
|
Definition
|
|
Term
Which of the following is not a characeristic of Keberos?
A. End to end security B.Symmetric key cryptography C. Peer to peer relationships D. Data Encryption Standard |
|
Definition
C. Peer to peer relationships |
|
|
Term
What is another term for the type of logon credentials provided by a token device? |
|
Definition
One-time password motha fucka |
|
|
Term
Which of the following is the strongest form of multi-factor authentication? A. Two passwords B. Two-factor authentication C. A password,a biometric scan, and a token device D. A password and a biometric scan |
|
Definition
C. A password, a biometric scan, and a token device |
|
|
Term
|
Definition
A process by which each party in an online communication verifies the identity of the other party. |
|
|
Term
Which of the following is not a form of biometric? A. Token device B. Face recognition C. Retina scan D. Finger print |
|
Definition
|
|
Term
What are two disadvantages of biometrics? |
|
Definition
When used alone or solely, they are no more secure than a strong password. Also, they have a potential for numerous false rejections |
|
|
Term
What form of authentication solution employs a hashed form of the user's password that has an assed time stamp as a form of identity? |
|
Definition
|
|
Term
What is the most important aspect of a biometric device? |
|
Definition
|
|
Term
What is the strongest biometric factor? |
|
Definition
A two factor authentication |
|
|
Term
Which of the following is not an example of a single sign-on solution? A. Scripted access B. Keberos C. Directory services D. Workgroup |
|
Definition
|
|
Term
Name two advantages single sign on (SSO) provide? |
|
Definition
1. The elimination of multiple user accounts and passwords for an individual. 2. Access to all authhorized resources with a single instance og authentication. |
|
|
Term
A smart card can be used to store all BUT which of the following items? A. Digital signature B. Biometric template original C. Cryptography keys D. Identifaction codes |
|
Definition
B. Biometric template original |
|
|
Term
Which teo of the following are requirements to deploy keberos on a network? A. A centralized database of users and passwords B. Time Syncronization between devices C. Blocking of remote connectivity D. Use of token devices and one-time passwords E. A directory service |
|
Definition
A. A centralized database of users and passwords B. Time syncronization between devices |
|
|
Term
Which of the following is NOT an important aspect of password management? A. Enable account lockout B. Prevent use of personal information in a password C.Always store passwords in a secure medium D. Training users to create complex passwords that use that are easy to remember |
|
Definition
A. Enable account lockout |
|
|
Term
In a variation of the brute force attack, an attacker may use a predefined list (dictionary) of commonly used usernames and passwords to gain access to existing user accounts. Which countermeasure best addresses this issue? |
|
Definition
|
|
Term
What is an example of privlage escalation? |
|
Definition
|
|
Term
Which of the following is the least reliable means to clean or purge media? A. Overwritting every sector with alternating 1's and 0's B. OS low-level formatting C.Drive controller hardware level formatting D. Degaussing |
|
Definition
|
|
Term
In a high society enviroment, what is the most important concern when a removable media is no longer needed? |
|
Definition
|
|
Term
In a high society enviroment, what is the most important concern when a removable media is no longer needed? |
|
Definition
|
|
Term
What type of cipher changes the POSITION of the characters in a plaintext message? |
|
Definition
|
|
Term
The Enigma machine, a crptographic tool introduced in 1944 and used in WW2, Encrypted messages by replacing characters for plaintext. What type of cipher does the Enigma machine use? |
|
Definition
|
|
Term
By definition, which security concept ensures that only authorized parties can access data? |
|
Definition
|
|
Term
In a cryptographic system, name two properties should initialization vector have? |
|
Definition
|
|
Term
name two things that are true of triple DES (3DES)? |
|
Definition
Is used in IPSEC, and it uses a 168-bit-key |
|
|
Term
What is the is the most frequently used symmetric key stream sipher? |
|
Definition
|
|
Term
Which of the following is NOT true concerning symmetric key cryptograpghy? A.Before communications begin, both parties must exchange the shared secret key B.Key management is easy when imlemented on a large scale. C.Each pair of communicating entities requires a unique shared key D. The key is not shared with other communication partners E. Both parties share the same key (which is kept secret) |
|
Definition
B. Key management is easy when implemented on a large scale. |
|
|
Term
What form of cryptography is best implemented in hardware? |
|
Definition
|
|
Term
Name two Advanced Encryption Standard (AES) Symmetric block cipher? |
|
Definition
AES uses a variable length block and key length (128-,192-, or 256-bit keys) and AES uses the Rijndael block cipher. |
|
|
Term
Which of the following symmetric block ciphers does NOT use a variable block length? A. Elliptic Curve (EC) B. International Data Encryption Algorithm (IDEA) C. Standard (AES) D. Ron's Cipher v5 (RC5) |
|
Definition
B. International Data Encryption Algorithm (IDEA) |
|
|