Term
| The Information Security Triad consists of which three areas? |
|
Definition
| Confidentiality, Integrity, and Availability |
|
|
Term
| In reference to the Information Security Triad, What does Confidentiality mean? |
|
Definition
| Preventing unauthorized access to sensitive or critical data |
|
|
Term
| In reference to the Information Security Triad, What are the two sections of integrity? |
|
Definition
| Data Integrity and System Integrity |
|
|
Term
| In reference to the Information Security Triad, What does Data Integrity mean? |
|
Definition
| Data in the system is accurate |
|
|
Term
| In reference to the Information Security Triad, What does System Integrity mean? |
|
Definition
| That the system performs exactly as intended |
|
|
Term
| In reference to the Information Security Triad, What does Availability mean? |
|
Definition
| Access control mechanisms must not prevent information and resources from being available to authorized users. |
|
|
Term
| As it relates to Access Control, what does security refer to? |
|
Definition
| Ensure only authorized people or processes are granted access |
|
|
Term
| As it relates to Access Control, what does reliability refer to? |
|
Definition
| Assurance that the control functions as expected every time |
|
|
Term
| As it relates to Access Control, what does transparency refer to? |
|
Definition
| The controls should have minimum impact on authorized users |
|
|
Term
| As it relates to Access Control, what does scalability refer to? |
|
Definition
| Access controls should be able to handle a wide range of changing systems |
|
|
Term
| As it relates to Access Control, what does maintainability refer to? |
|
Definition
| Access control solutions must be maintainable to be effective |
|
|
Term
| What is the key concept behind separation of duties? |
|
Definition
| No one person should have complete control over the processing of a transaction |
|
|
Term
| As it relates to Access Control, what does integrity refer to? |
|
Definition
| Systems must be designed to protect subjects, objects, and permissions from unauthorized changes |
|
|
Term
| What does the concept of Least Privilege mean? |
|
Definition
| People or processes should only be allowed access to the resources they absolutely need to accomplish their assigned work |
|
|
Term
| What does the Need to Know Principle mean? |
|
Definition
| Restricting users from accessing information not required to do their job, even if they have the proper level of clearance. |
|
|
Term
| What does Information Classification refer to? |
|
Definition
| The proper assessment of the sensitivity and criticality of a given piece of information |
|
|
Term
| What is Compartmentalized Information? |
|
Definition
| Information that requires special authorization beyond the normal classification. |
|
|
Term
| What are the three types of Access Control? |
|
Definition
| Administrative, Technical/Logical, and Physical |
|
|
Term
| What are the categories of Access Control? |
|
Definition
| Preventative, Detective, Corrective, Directive, Deterrent, Recovery, Compensating |
|
|
Term
| What does Identification mean? |
|
Definition
| The means by which the user provides a claimed identity to the system |
|
|
Term
| What are the three methods of authentication? |
|
Definition
| Knowledge, Ownership, and Characteristics |
|
|
Term
| What is an Asynchronous Token Device? |
|
Definition
| A device using a numeric keyboard for challenge-response technology |
|
|
Term
| What are the two types of synchronous tokens? |
|
Definition
| Event Based Synchronization, and Time-based synchronization |
|
|
Term
| How do contactless smart cards work? |
|
Definition
| They contain an embedded radio frequency tranciever |
|
|
Term
| What do physiological biometrics measure? |
|
Definition
|
|
Term
| When dealing with Biometric Accuracy, what do we call the intersection between the False Acceptance Rate and the False Rejection Rate? |
|
Definition
|
|
Term
| What are the Identity Management Challenges? |
|
Definition
| Consistency, Reliability, Usability, Efficiency, and Scalability |
|
|
Term
| What type of encryption does Kerberos use? |
|
Definition
|
|
Term
| What do we call the combination of both an Authentication Server and a Ticket Granting Server in a Kerberos deployment? |
|
Definition
|
|
Term
| SESAME is an extension of what other technology? |
|
Definition
|
|
Term
| What type of key does SESAME use? |
|
Definition
| Both symmetric and assymetric |
|
|
Term
| Which Model does Hierarchical Domain control follow? |
|
Definition
|
|
Term
| What does Service Provisioning Markup Service do? |
|
Definition
| Provides an XML based framework for managing the allocation of system resources within and between organizations |
|
|
Term
| Restricting access to objects based on the sensitivity of the information and the formal authorization of subjects to access such sensitivity is known as what? |
|
Definition
|
|
Term
| Configuring the system to only allow access to certain information during specific times is known as _____________. |
|
Definition
|
|
Term
| When using a Discretionary Access Control system, who assigns access? |
|
Definition
|
|
Term
| What does the information owner provide in the Mandatory Access Control system? |
|
Definition
| The "need to know" element |
|
|
Term
| A ________ access control policy bases access control authorizations on the user's job functions. |
|
Definition
|
|
Term
| What is a current example of rule based access control? |
|
Definition
|
|
Term
| ________ access control is based on the actual content of the data record. |
|
Definition
|
|
Term
| What is the most common type of Discretionary Access Control? |
|
Definition
|
|
Term
| A _________ is a collection of access control lists implemented by comparing the column of objects with the rows of subjects. |
|
Definition
| Subject Oriented Capability Table |
|
|
Term
| In __________ access control, access rules are closely managed by the security administrator. |
|
Definition
|
|
Term
| What type of access control do most Operating Systems use? |
|
Definition
|
|
Term
| What type of analysis engine compares current activity with normal activity? |
|
Definition
|
|
Term
|
Definition
| A record of system activities |
|
|
Term
| __________ consists of a formal set of steps and procedures similar to what an attacker would use to compromise a network. |
|
Definition
|
|
Term
| What are the three attack strategies used in penetration testing? |
|
Definition
| Black Box, partial knowledge and white box |
|
|
Term
| What are the three types of access control? |
|
Definition
| Administrative, technical, and physical |
|
|
Term
| Separation of duties forces collusion to commit fraud. Collusion can best be broken up by ____________. |
|
Definition
|
|
Term
| What is the main benefit of an information classification system? |
|
Definition
| To give data the appropriate level of protection |
|
|
Term
| What is an authoritative system of records? |
|
Definition
| A hierarchical parent system that tracks users, accounts, and authorization chains |
|
|
Term
|
Definition
| Controls emanations from electronic equipment |
|
|
Term
| In Mandatory Access Control, who determines the need to know? |
|
Definition
|
|
Term
| In content dependent access control, what is the key element that determines the effective access authorization? |
|
Definition
|
|
Term
| An alternate control used when another fails is called a ____________. |
|
Definition
|
|
Term
| How could an attacker use an IPS to help create a Denial of Service? |
|
Definition
| By generating a false attack that causes the IPS to block legitimate traffic |
|
|
Term
| How can attackers exploit password security guidelines to their advantage? |
|
Definition
| By intentionally entering incorrect passwords to lock out user accounts |
|
|
Term
| Why are passphrases considered more secure than passwords? |
|
Definition
| Because passphrases are longer |
|
|
Term
| Which error rate of the biometric error rates is by far the more serious? |
|
Definition
|
|
Term
| What does the hierarchical domain relationship mean? |
|
Definition
| Subjects are allowed to access objects at or lower than their access level |
|
|