Intro To Network Security Sixth Ed Chapter 12

10 September 2022
4.7 (114 reviews)
59 test answers

Unlock all answers in this set

Unlock answers (55)
question
B. TACACS+
answer
1. What is the current version of TACACS? A. XTACACS B. TACACS+ C. TACACS v9 D. TRACACS
question
A. It allows secure web domains to exchange user authentication and authorization data.
answer
2. How is the Security Assertion Markup Language (SAML) used? A. It allows secure web domains to exchange user authentication and authorization data. B. It is a backup to a RADIUS server. C. It is an authenticator in IEEE 802.1x. D. It is no longer used because it has been replaced by LDAP.
question
D. supplicant
answer
3. A RADIUS authentication server requires the ________ to be authenticated first. A. authenticator B. user C. authentication server D. supplicant
question
D. All orphaned and dormant accounts should be deleted immediately whenever they are discovered.
answer
4. Which of the following is NOT true regarding how an enterprise should handle an orphaned or dormant account? A. A formal procedure should be in place for disabling accounts for employees who are dismissed, resign, or retire from the organization. B. Access should be ended as soon as the employee is no longer part of the organization. C. Logs should be monitored because current employees are sometimes tempted to use an older dormant account instead of their own account. D. All orphaned and dormant accounts should be deleted immediately whenever they are discovered.
question
A. RADIUS
answer
5. With the development of IEEE 802.1x port security, what type of authentication server has seen even greater usage? A. RADIUS B. Lite RDAP C. DAP D. RDAP
question
B. Access
answer
6. Which of the following is NOT part of the AAA framework? A. Authentication B. Access C. Authorization D. Accounting
question
C. LDAP
answer
7. What is the version of the X.500 standard that runs on a personal computer over TCP/IP? A. Lite RDAP B. DAP C. LDAP D. IEEE X.501
question
C. Custodian
answer
8. Raul has been asked to serve as the individual to whom day-to-day actions have been assigned by the owner. What role is Raul taking? A. Privacy officer B. End-user C. Custodian D. Operator
question
B. MAC
answer
9. Which access control model is the most restrictive? A. DAC B. MAC C. Role-Based Access Control D. Rule-Based Access Control
question
A. ABAC
answer
10. Which type of access control model uses predefined rules that makes it flexible? A. ABAC B. DAC C. MAC D. Rule-Based Access Control
question
A. Location-based policies
answer
11. Which can be used to establish geographical boundaries where a mobile device can and cannot be used? A. Location-based policies B. Restricted access control policies C. Geolocation policies D. Mobile device policies
question
C. It dynamically assigns roles to subjects based on rules.
answer
12. Which statement about Rule-Based Access Control is true? A. It requires that a custodian set all rules. B. It is considered obsolete today. C. It dynamically assigns roles to subjects based on rules. D. It is considered a real-world approach by linking a user's job function with security.
question
A. Do not share passwords with other employees.
answer
13. Which of the following would NOT be considered as part of a clean desk policy? A. Do not share passwords with other employees. B. Lock computer workstations when leaving the office. C. Place laptops in a locked filing cabinet. D. Keep mass storage devices locked in a drawer when not in use.
question
A. Access control list (ACL)
answer
14. Which of these is a set of permissions that is attached to an object? A. Access control list (ACL) B. Subject Access Entity (SAE) C. Object modifier D. Security entry designator
question
C. Group Policy
answer
15. Which Microsoft Windows feature provides group-based access control for centralized management and configuration of computers and remote users who are using Active Directory? A. Windows Registry Settings B. AD Management Services (ADMS) C. Group Policy D. Resource Allocation Entities
question
D. ACLs
answer
16. What can be used to provide both file system security and database security? A. RBASEs B. LDAPs C. CHAPs D. ACLs
question
A. DAC
answer
17. What is the least restrictive access control model? A. DAC B. ABAC C. MAC D. Rule-Based Access Control
question
A. LDAPS
answer
18. What is the secure version of LDAP? A. LDAPS B. Secure DAP C. X.500 D. 802.1x
question
B. MS-CHAP
answer
19. Which of the following is the Microsoft version of EAP? A. EAP-MS B. MS-CHAP C. PAP-MICROSOFT D. AD-EAP
question
B. Access
answer
20. Which of the following involves rights given to access specific resources? A. Identification B. Access C. Authorization D. Accounting
question
access control
answer
The mechanism used in an information system for granting or denying approval to use specific resources.
question
access control model
answer
A predefined framework found in hardware and software that a custodian can use for controlling access.
question
accounting
answer
A record that is preserved of who accessed the network, what resources they accessed, and when they disconnected from the network.
question
Attribute-Based Access Control (ABAC)
answer
An access control model that uses more flexible policies that can combine attributes.
question
authorization
answer
Granting permission to take an action.
question
Challenge-Handshake Authentication Protocol (CHAP)
answer
A weak version of Extensible Authentication Protocol (EAP).
question
clean desk
answer
A policy designed to ensure that all confidential or sensitive materials are removed from a user's workspace and secured when the items are not in use or an employee leaves her workspace.
question
custodian (steward)
answer
Individual to whom day-to-day actions have been assigned by the owner.
question
database security
answer
Security functions provided by access control lists (ACLs) for protecting SQL and relational database systems.
question
directory service
answer
A database stored on the network itself that contains information about users and network devices.
question
Discretionary Access Control (DAC)
answer
The least restrictive access control model in which the owner of the object has total control over it.
question
employee offboarding
answer
The tasks associated when an employee is released from the enterprise.
question
employee onboarding
answer
The tasks associated when hiring a new employee.
question
file system security
answer
Security functions provided by access control lists (ACLs) for protecting files managed by the operating system.
question
group-based access control
answer
Configuring multiple computers by setting a single policy for enforcement.
question
identification
answer
Credentials presented by a user accessing a computer system. Also used in forensics as an action step in the incident response process that involves determining whether an event is actually a security incident.
question
job rotation
answer
The act of moving individuals from one job responsibility to another.
question
Kerberos
answer
An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
question
LDAP over SSL (LDAPS)
answer
Securing LDAP traffic by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS).
question
least privilege
answer
Providing only the minimum amount of privileges necessary to perform a job or function.
question
Lightweight Directory Access Protocol (LDAP)
answer
A protocol for a client application to access an X.500 directory.
question
location-based policies
answer
Policies that establish geographical boundaries where a mobile device can and cannot be used.
question
Mandatory Access Control (MAC)
answer
The most restrictive access control model, typically found in military settings in which security is of supreme importance.
question
mandatory vacations
answer
Requiring that all employees take vacations.
question
MS-CHAP
answer
The Microsoft version of Challenge-Handshake Authentication Protocol (CHAP).
question
owner
answer
A person responsible for the information.
question
Password Authentication Protocol (PAP)
answer
A weak version of Extensible Authentication Protocol (EAP).
question
permission auditing and review
answer
A review that is intended to examine the permissions that a user has been given to determine if each is still necessary.
question
privacy officer
answer
A manager who oversees data privacy compliance and manages data risk.
question
RADIUS (Remote Authentication Dial In User Service)
answer
An industry standard authentication service with widespread support across nearly all vendors of networking equipment.
question
recertification
answer
The process of periodically revalidating a user's account, access control, and membership role or inclusion in a specific group.
question
Role-Based Access Control (RBAC)
answer
A "real-world" access control model in which access is based on a user's job function within the organization.
question
Rule-Based Access Control
answer
An access control model that can dynamically assign roles to subjects based on a set of rules defined by a custodian.
question
Security Assertion Markup Language (SAML)
answer
An Extensible Markup Language (XML) standard that allows secure web domains to exchange user authentication and authorization data.
question
separation of duties
answer
The practice of requiring that processes should be divided between two or more individuals.
question
standard naming conventions
answer
Rules for creating account names.
question
TACACS+
answer
The current version of the Terminal Access Control Access Control System (TACACS) authentication service.
question
time-of-day restriction
answer
Limitation imposed as to when a user can log in to a system or access resources.
question
usage auditing and review
answer
An audit process that looks at the applications that the user is provided, how frequently they are used, and how they are being used.