Name at least seven access control types.
Describe the three primary authentication factor types
Type 1. Something you know
Type 2. Something you have
Type 3. Something you are
Name the method that allows users to log on once and access resources in multiple organizations without authenticating again.
Single Sign On (SSO)
examples: Kerberos, SESAME, Directory, SESAME
Identify the three primary elements within the identity and access provisioning life cycle.
C. The subject is active and is always the entity that receives information about or data from the object.
A. Access control mechanisms help to prevent losses, including any loss of confidentiality, loss of availability, or loss of integrity.
3. Which of the following types of access control uses fences, security policies, security awareness training, and antivirus software to stop an unwanted or unauthorized activity from occurring? A. Preventive B. Detective C. Corrective D. Authoritative
A. A preventive access control is deployed to stop an unwanted or unauthorized activity from occurring
4. What type of access controls are hardware or software mechanisms used to manage access to resources and systems and to provide protection for those resources and systems? A. Administrative B. Logical/technical C. Physical D. Preventive
5. All of the following are needed for system accountability except for one. Which one is not needed? A. Identification B. Authentication C. Auditing D. Authorization
D. Authorization is not needed for accountability. However, users must be identified and authenticated and their actions logged using some type of auditing to provide accountability.
7. Users are given a device that generates one-time passwords every 60 seconds. A server hosted within the organization knows what this password is at any given time. What type of device is this? A. Synchronous token B. Asynchronous token C. Smart card D. Common access card
8. What can be used as an authentication factor that is a behavioral or physiological characteristic unique to a subject? A. Account ID B. Biometric factor C. Token D. PIV
10. A biometric system has falsely rejected a valid user, indicating that the user is not recognized. What type of error is this? A. Type 1 error B. Type 2 error C. Crossover error rate D. Equal error rate
A Type 2 error occurs when an invalid subject is authenticated. This is also known as a false positive authentication.
The crossover error rate (also called equal error rate) compares the rate of Type 1 errors to Type 2 errors and provides a measurement of the accuracy of the biometric system.
11. A large table includes multiple subjects and objects. It identifies the specific access each subject has to different objects. What is this table called? A. Access control list B. Access control matrix C. Federation D. Creeping privilege
A single list of subjects for any specific object within an access control matrix is an access control list.
12. What is an access control list (ACL) based on? A. An object B. A subject C. A role D. An account
13. What type of access controls rely upon the use of labels? A. Discretionary B. Nondiscretionary C. Mandatory D. Role based
Discretionary access control systems allow an owner of an object to control access to the object.
Nondiscretionary access controls have centralized management such as a rule-based access control deployed on a firewall.
Role-based access controls define a subject’s access based on job-related roles.
14. An organization has created an access control policy that grants specific privileges to accountants. What type of access control is this? A. Discretionary B. Mandatory C. Rule based D. Role based
15. Which of the following is not used to support single sign-on? A. Kerberos B. Federated identity management system C. TACACS+ D. SPML
Kerberos and federated identity management systems are used to support single sign-on. Service Provisioning Markup Language (SPML) is a language used with some federated identity systems.
An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within the company and has retained privileges from each of the jobs that he’s had during his tenure. Recently, he has been admonished for making unauthorized changes to systems. He once again made an unauthorized change and this change resulted in an unexpected outage. Management decided to terminate his employment at the company. He was allowed to come back to work the following day to clean out his desk and belongings, and during this time he installed a malicious script that was scheduled to run as a logic bomb on the first day of the following month. The script will change administrator passwords, delete files, and shut down over 100 servers in the data center.
18. Which of the following basic principles was violated while the administrator was employed? A. Implicit deny B. Loss of availability C. Defensive privileges D. Least privilege
19. Which of the following concepts was not adequately addressed for the identity and access provisioning life cycle? A. Provisioning B. Separation of duties C. Revocation D. Authentication methods
What is Preventive Access Control, and examples
A preventive access control is deployed to stop unwanted or unauthorized activity from occurring
Examples of preventive access controls include
fences and locks biometrics alarm systems separation of duties and job rotation data classification encryption security cameras or closed circuit television (CCTV) security policies
What is Deterrent Access Control, and examples
A deterrent access control is deployed to discourage violation of security policies
Deterrent controls pick up where prevention leaves off
A deterrent doesn’t stop with trying to prevent an action, but implies certain consequences in the event of an attempted or successful violation
Examples of deterrent access controls include security badges security guards security cameras trespass or intrusion alarms firewalls
What is Detective Access Control, and examples
A detective access control is deployed to discover unwanted or unauthorized activity
Often detective controls operate after the fact
Examples of detective access controls include intrusion detection systems security guards, guard dogs motion detectors review of recordings captured by security cameras audit trails honeypots or honeynets incident investigations