Logical Security Controls Quiz
12 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of control is exemplified by fences, doors, and locks?

  • Cyber control
  • Physical control (correct)
  • Logical control
  • Procedural control
  • What is the primary function of an access control system described in the AAA triad?

  • Authorization
  • Authentication (correct)
  • Accession
  • Accounting
  • Which of the following is an example of a logical control?

  • Fences and locks
  • User authentication (correct)
  • Management oversight
  • Incident response processes
  • What is the main purpose of a firewall as a security control?

    <p>Controlling network communications</p> Signup and view all the answers

    What is a permission in the context of access control?

    <p>A security setting that determines the level of access an account has to a particular resource</p> Signup and view all the answers

    What is an access control entry (ACE) used for within an ACL?

    <p>Identifies a subject and the permissions it has for the resource</p> Signup and view all the answers

    How are subjects typically identified in network firewalls?

    <p>By MAC address, IP address, and/or port number</p> Signup and view all the answers

    What is the principle of implicit deny in ACL security?

    <p>Unless there is a rule specifying that access should be granted, any request for access is denied</p> Signup and view all the answers

    What is the complementary principle to implicit deny in access control?

    <p>Least Privilege</p> Signup and view all the answers

    What is the identifier used in the underlying permission entries in Windows directory permissions?

    <p>Unique security ID (SID)</p> Signup and view all the answers

    What happens if an account is deleted and then recreated with the same username in Windows directory permissions?

    <p>The SID will still be different, and any permissions assigned to the account will have to be recreated</p> Signup and view all the answers

    How are firewall policies typically processed when filtering access requests?

    <p>In order from top to bottom, with the last (default) rule being to refuse the request if it doesn't fit any of the rules</p> Signup and view all the answers

    More Like This

    Logical Security Controls Quiz
    12 questions
    Data Security Benefits Quiz
    7 questions

    Data Security Benefits Quiz

    RefinedMountRushmore avatar
    RefinedMountRushmore
    Seguridad Lógica en Computación
    12 questions
    Use Quizgecko on...
    Browser
    Browser