Logical Security Controls Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of control is exemplified by fences, doors, and locks?

  • Cyber control
  • Physical control (correct)
  • Logical control
  • Procedural control

What is the primary function of an access control system described in the AAA triad?

  • Authorization
  • Authentication (correct)
  • Accession
  • Accounting

Which of the following is an example of a logical control?

  • Fences and locks
  • User authentication (correct)
  • Management oversight
  • Incident response processes

What is the main purpose of a firewall as a security control?

<p>Controlling network communications (A)</p> Signup and view all the answers

What is a permission in the context of access control?

<p>A security setting that determines the level of access an account has to a particular resource (A)</p> Signup and view all the answers

What is an access control entry (ACE) used for within an ACL?

<p>Identifies a subject and the permissions it has for the resource (C)</p> Signup and view all the answers

How are subjects typically identified in network firewalls?

<p>By MAC address, IP address, and/or port number (B)</p> Signup and view all the answers

What is the principle of implicit deny in ACL security?

<p>Unless there is a rule specifying that access should be granted, any request for access is denied (B)</p> Signup and view all the answers

What is the complementary principle to implicit deny in access control?

<p>Least Privilege (D)</p> Signup and view all the answers

What is the identifier used in the underlying permission entries in Windows directory permissions?

<p>Unique security ID (SID) (D)</p> Signup and view all the answers

What happens if an account is deleted and then recreated with the same username in Windows directory permissions?

<p>The SID will still be different, and any permissions assigned to the account will have to be recreated (D)</p> Signup and view all the answers

How are firewall policies typically processed when filtering access requests?

<p>In order from top to bottom, with the last (default) rule being to refuse the request if it doesn't fit any of the rules (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser