Deck 5: Access Control
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/124
Play
Full screen (f)
Deck 5: Access Control
1
In military security, the term multilevel security means multifactor security.
False
2
Which of the following should be forbidden in secure areas?
A) Cameras
B) USB flash drives
C) Both A and B
D) Neither A nor B
A) Cameras
B) USB flash drives
C) Both A and B
D) Neither A nor B
C
3
Placing sensitive equipment in secure areas to minimize potential threats and damage is called siting.
True
4
In ________ the department has discretion over giving access to individuals, within policy standards set by higher authorities.
A) policy-based access control
B) mandatory access control
C) discretionary access control
D) delegated access control
A) policy-based access control
B) mandatory access control
C) discretionary access control
D) delegated access control
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
5
Compared to access control based on individual accounts, RBAC is ________.
A) less prone to error
B) more expensive
C) Both A and B
D) Neither A nor B
A) less prone to error
B) more expensive
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
6
________ can be used to supply power during long power outages.
A) Uninterruptable power supplies
B) Electrical generators
C) Both A and B
D) Neither A nor B
A) Uninterruptable power supplies
B) Electrical generators
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
7
________ is the process of collecting information about the activities of each individual in log files for immediate and later analysis.
A) Authorizations
B) Authentication
C) Accuracy
D) Auditing
A) Authorizations
B) Authentication
C) Accuracy
D) Auditing
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
8
________ is the process of assessing the identity of each individual claiming to have permission to use a resource.
A) Authorizations
B) Authentication
C) Accuracy
D) Auditing
A) Authorizations
B) Authentication
C) Accuracy
D) Auditing
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
9
In the military, departments do not have the ability to alter access control rules set by higher authorities in ________.
A) policy-based access control
B) mandatory access control
C) discretionary access control
D) multilevel access control
A) policy-based access control
B) mandatory access control
C) discretionary access control
D) multilevel access control
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is not one of the AAA controls?
A) Authentication
B) Auditing
C) Accuracy
D) Authorizations
A) Authentication
B) Auditing
C) Accuracy
D) Authorizations
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is not one of the rules for working in secure areas?
A) Unsupervised work in secure areas should be avoided.
B) When no one is in a secure area, it should be locked and verified periodically.
C) No one should be allowed to work in secure areas for more than four hours in a row.
D) Electronic devices that can record or copy mass amounts of information should be forbidden in secure areas.
A) Unsupervised work in secure areas should be avoided.
B) When no one is in a secure area, it should be locked and verified periodically.
C) No one should be allowed to work in secure areas for more than four hours in a row.
D) Electronic devices that can record or copy mass amounts of information should be forbidden in secure areas.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is one of the four bases for authentication credentials?
A) What you know
B) What you have
C) Both A and B
D) Neither A nor B
A) What you know
B) What you have
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
13
On loading docks, outgoing shipments should be separated from incoming shipments ________.
A) to ensure the segregation of duties
B) to avoid confusion
C) to reduce the risk of theft
D) All of the above
A) to ensure the segregation of duties
B) to avoid confusion
C) to reduce the risk of theft
D) All of the above
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
14
Two-factor authentication can be defeated if ________.
A) the user's computer is compromised
B) the attacker uses a man-in-the-middle attack
C) Both A and B
D) Neither A nor B
A) the user's computer is compromised
B) the attacker uses a man-in-the-middle attack
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
15
In CobiT, entry must be ________.
A) justified
B) logged
C) Both A and B
D) Neither A nor B
A) justified
B) logged
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
16
If a laptop needs to be taken off premises, ________.
A) it should first be logged out.
B) it should be logged in when returned
C) all sensitive information should be removed
D) All of the above
A) it should first be logged out.
B) it should be logged in when returned
C) all sensitive information should be removed
D) All of the above
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
17
________ is the process of assessing the identity of each individual claiming to have permission to use a resource.
A) Authorizations
B) Authentication
C) Both A and B
D) Neither A nor B
A) Authorizations
B) Authentication
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
18
Authentication is the process of collecting information about the activities of each individual in log files for immediate and later analysis.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
19
In military security, SBU documents are unclassified.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
20
All unattended exits should be locked to bar exit.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
21
A ________ is a small device with a display that has a number that changes frequently.
A) one-time-password token
B) USB token
C) magnetic stripe card
D) None of the above
A) one-time-password token
B) USB token
C) magnetic stripe card
D) None of the above
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
22
A ________ card is an access card that has a built-in microprocessor and memory.
A) magnetic stripe
B) smart
C) Both A and B
D) Neither A nor B
A) magnetic stripe
B) smart
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
23
Password cracking is usually done over the network by trying many passwords to log into an account.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
24
The book recommends that passwords be at least ________ characters long.
A) 6
B) 8
C) 20
D) 100
A) 6
B) 8
C) 20
D) 100
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
25
According to the book, r%Dv$ is a strong password.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
26
Long passwords that use several types of keyboard characters are called ________ passwords.
A) complex
B) reusable
C) dictionary
D) one-time
A) complex
B) reusable
C) dictionary
D) one-time
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
27
A ________ card stores authentication data.
A) magnetic stripe
B) smart
C) Both A and B
D) Neither A nor B
A) magnetic stripe
B) smart
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
28
Most users who have access to servers use reusable passwords for authentication.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
29
Buildings should be set back from streets and protected with rolling hill landscaping to reduce threats from ________.
A) wireless eavesdropping
B) industrial espionage
C) casual observation
D) terrorism
A) wireless eavesdropping
B) industrial espionage
C) casual observation
D) terrorism
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is true?
A) Human password resets are dangerous.
B) Automated password resets are dangerous.
C) Both A and B
D) Neither A nor B
A) Human password resets are dangerous.
B) Automated password resets are dangerous.
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
31
Passwords should be changed frequently.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
32
In high-risk environments, password reset risks are reduced by requiring the user's physical presence.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
33
Passwords offer reasonable security at reasonable cost and will likely continue to increase in importance in the future.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
34
It is illegal to go through a company's trash bins even if the trash bins are outside the corporation.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
35
Users should select very long and complex passwords and use the same password at all sites for auditability.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
36
________ is a social engineering trick where an intruder may follow an authorized user through a door that the authorized user opens with an access device.
A) Shoulder surfing
B) Shadowing
C) Trailing
D) Piggybacking
A) Shoulder surfing
B) Shadowing
C) Trailing
D) Piggybacking
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
37
It is very important for testers to get permission before running a password cracking program on their company's computers to check for weak passwords even if such testing is in their job definitions.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
38
PCs should require login screens with complex passwords.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
39
A ________ is a small device that plugs into a standard computer port to identify the owner.
A) one-time-password token
B) USB token
C) magnetic stripe card
D) smart card
A) one-time-password token
B) USB token
C) magnetic stripe card
D) smart card
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
40
A magnetic stripe card is an access card that has a built-in microprocessor and memory.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
41
Which is more likely to generate a false acceptance?
A) Verification
B) Identification
C) Both verification and identification are equally likely to generate a false acceptance.
D) None of the above
A) Verification
B) Identification
C) Both verification and identification are equally likely to generate a false acceptance.
D) None of the above
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
42
In biometric, a match occurs when a ________ meets the decision criteria.
A) set of key features
B) match index
C) Both A and B
D) Neither A nor B
A) set of key features
B) match index
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
43
________ can be much shorter than ________.
A) PINs, passwords
B) Passwords, PINs
C) There is no general length difference between passwords and PINs.
D) None of the above
A) PINs, passwords
B) Passwords, PINs
C) There is no general length difference between passwords and PINs.
D) None of the above
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
44
During enrollment, the scanner sends ________ to the authentication system.
A) scan data
B) key features
C) Both A and B
D) Neither A nor B
A) scan data
B) key features
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
45
A false rejection occurs when a person is improperly matched to a template.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
46
The template is based on ________ generated during the enrollment scan.
A) scan data
B) key features
C) Both A and B
D) Neither A nor B
A) scan data
B) key features
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
47
For watch lists of criminals, a false ________ means that an innocent person is identified as a criminal.
A) acceptance
B) rejection
C) Both A and B
D) Neither A nor B
A) acceptance
B) rejection
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
48
Verification is the process where the verifier determines the identity of the supplicant.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
49
Verification requires more matches against templates than does identification.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
50
________ is a form of identification that identifies a person as being a member of a group.
A) RBAC
B) Watch list matching
C) Group ID matching
D) Group acceptance
A) RBAC
B) Watch list matching
C) Group ID matching
D) Group acceptance
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
51
A ________ does not require a special reader to be added to a PC for access control.
A) USB token
B) magnetic stripe card
C) smart card
D) All of the above
A) USB token
B) magnetic stripe card
C) smart card
D) All of the above
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
52
The verifier itself determines the identity of the supplicant in ________.
A) verification
B) identification
C) Both A and B
D) Neither A nor B
A) verification
B) identification
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
53
Identification requires more matches against templates than does verification.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
54
For computer access, a false ________ means that a legitimate user is denied access to a resource.
A) rejection
B) acceptance
C) Both A and B
D) Neither A nor B
A) rejection
B) acceptance
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
55
When an attacker deliberately attempts to fool the system, this is called ________.
A) deception
B) a false acceptance
C) a false rejection
D) All of the above.
A) deception
B) a false acceptance
C) a false rejection
D) All of the above.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
56
The major promise of biometrics is to replace reusable passwords.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
57
Identification is the process where the verifier determines whether the supplicant is a particular person that the supplicant claims who he or she is.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
58
A false acceptance occurs when a person is improperly matched to a template.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
59
From a security viewpoint, a false acceptance is always worse than a false rejection.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
60
For watch lists of criminals, a false acceptance is worse than a false rejection from a security viewpoint.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
61
Because fingerprint scanning is often deceived, it should never be used as a security measure.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
62
The ________ authentication problem is that unless individuals are carefully vetted before being allowed in a system, imposters can simply enroll through social engineering.
A) core
B) prime
C) final
D) human
A) core
B) prime
C) final
D) human
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
63
The principle of ________ states that each person should only get the permissions that he or she absolutely needs to do his or her job.
A) appropriate authorizations
B) least permissions
C) minimization
D) All of the above.
A) appropriate authorizations
B) least permissions
C) minimization
D) All of the above.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
64
Fingerprint scanning, which is often deceived, may be acceptable for entry into a non-sensitive supplies cabinet.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
65
Fingerprint recognition should be used as a security measure for access to ________.
A) a non-essential supply cabinet
B) a notebook containing sensitive information
C) Both A and B
D) Neither A nor B
A) a non-essential supply cabinet
B) a notebook containing sensitive information
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
66
A private key/public key pair is usually created by the ________.
A) client
B) PKI server
C) Both A and B
D) Neither A nor B
A) client
B) PKI server
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
67
Hand geometry recognition is used heavily for ________.
A) PC access
B) watch list access
C) door access
D) server access
A) PC access
B) watch list access
C) door access
D) server access
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
68
CAs distribute public keys ________.
A) in digital certificates
B) only in ways using encryption for confidentiality
C) Both A and B
D) Neither A nor B
A) in digital certificates
B) only in ways using encryption for confidentiality
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
69
A firm can be its own certificate authority for internal users.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
70
Iris scanning usually is done surreptitiously.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
71
The most widely used form of biometrics is ________.
A) retinal scanning
B) iris scanning
C) fingerprint scanning
D) face recognition
A) retinal scanning
B) iris scanning
C) fingerprint scanning
D) face recognition
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
72
Biometric authentication is the strongest form of authentication.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
73
In the context of PKI, ________ is the process of accepting public keys and providing new digital certificates to the users.
A) provisioning
B) reflection
C) coordination
D) certification
A) provisioning
B) reflection
C) coordination
D) certification
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
74
The strongest form of authentication is ________.
A) biometrics
B) cryptographic authentication
C) reusable passwords
D) smart cards
A) biometrics
B) cryptographic authentication
C) reusable passwords
D) smart cards
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
75
Iris recognition technology is ________ and ________.
A) expensive, has low FARs
B) expensive, has high FARs
C) inexpensive, has low FARs
D) inexpensive, has high FARs
A) expensive, has low FARs
B) expensive, has high FARs
C) inexpensive, has low FARs
D) inexpensive, has high FARs
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
76
Authorizations are also called ________.
A) permissions
B) verifications
C) Both A and B
D) Neither A nor B
A) permissions
B) verifications
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
77
Giving a user permissions to use a certain resource is ________.
A) authentication
B) authorization
C) Both A and B
D) Neither A nor B
A) authentication
B) authorization
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following statements accurately describes iris recognition?
A) Iris recognition has high FARs.
B) Iris recognition technology is expensive.
C) Iris recognition scans the eye with lasers.
D) All of the above
A) Iris recognition has high FARs.
B) Iris recognition technology is expensive.
C) Iris recognition scans the eye with lasers.
D) All of the above
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
79
Fingerprint recognition is easily deceived.
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following statements accurately describes fingerprint recognition?
A) Fingerprint recognition scanners are very expensive.
B) Fingerprint recognition is easily deceived.
C) Fingerprint recognition is rarely used.
D) All of the above
A) Fingerprint recognition scanners are very expensive.
B) Fingerprint recognition is easily deceived.
C) Fingerprint recognition is rarely used.
D) All of the above
Unlock Deck
Unlock for access to all 124 flashcards in this deck.
Unlock Deck
k this deck