Topic 1: Access Control
What is called the verification that the user's claimed identity is valid and is usually
implemented through a user password at log-on time?
A.
Authentication
B.
Identification
C.
Integrity
D.
Confidentiality
RADIUS incorporates which of the following services?
A.
Authentication server and PIN codes.
B.
Authentication of clients and static passwords generation.
C.
Authentication of clients and dynamic passwords generation.
D.
Authentication server as well as support for Static and Dynamic passwords.
What is called the act of a user professing an identity to a system, usually in the form of a
log-on ID?
A.
Authentication
B.
Identification
C.
Authorization
D.
Confidentiality
Which of the following is most relevant to determining the maximum effective cost of
access control?
A.
the value of information that is protected
B.
management's perceptions regarding data importance
C.
budget planning related to base versus incremental spending
D.
.the cost to replace lost data
Which of the following describes the major disadvantage of many Single Sign-On (SSO)
implementations?
A.
Once an individual obtains access to the system through the initial log-on, they have
access to all resources within the environment that the account has access to.
.
B.
The initial logon process is cumbersome to discourage potential intruders.
C.
Once a user obtains access to the system through the initial log-on, they only need to
logon to some applications
D.
Once a user obtains access to the system through the initial log-on, he has to logout
from all other systems
How are memory cards and smart cards different?
A.
Memory cards normally hold more memory than smart cards
B.
Smart cards provide a two-factor authentication whereas memory cards don't
C.
Memory cards have no processing power
D.
Only smart cards can be used for ATM cards
Passwords can be required to change monthly, quarterly, or at other intervals:
A.
depending on the criticality of the information needing protection
B.
depending on the criticality of the information needing protection and the password's
frequency of use
C.
depending on the password's frequency of use
D.
not depending on the criticality of the information needing protection but depending on
the password's frequency of use
Which of the following access control models requires defining classification for objects?
A.
Role-based access control
B.
Discretionary access control
C.
Identity-based access control
D.
Mandatory access control
Which of the following would be true about Static password tokens?
A.
The owner identity is authenticated by the token
B.
The owner will never be authenticated by the token.
C.
The owner will authenticate himself to the system.
D.
The token does not authenticates the token owner but the system
Which of the following statements pertaining to access control is false?
A.
Users should only access data on a need-to-know basis.
.
B.
If access is not explicitly denied, it should be implicitly allowed.
C.
Access rights should be granted based on the level of trust a company has on a subject.
D.
Roles can be an efficient way to assign rights to a type of user who performs certain
tasks
Which of the following is the most reliable authentication method for remote access?
A.
Variable callback system
B.
Synchronous token
C.
Fixed callback system
D.
Combination of callback and caller ID
Which access control model is also called Non Discretionary Access Control (NDAC)?
A.
Lattice based access control
B.
Mandatory access control
C.
Role-based access control
D.
Label-based access control
Page 7 out of 88 Pages |
Previous |