Logical Security Controls Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which type of control is exemplified by fences, doors, and locks?

  • Cyber control
  • Physical control (correct)
  • Logical control
  • Procedural control

What is the primary function of an access control system described in the AAA triad?

  • Authorization
  • Authentication (correct)
  • Accession
  • Accounting

Which of the following is an example of a logical control?

  • Fences and locks
  • User authentication (correct)
  • Management oversight
  • Incident response processes

What is the main purpose of a firewall as a security control?

<p>Controlling network communications (A)</p> Signup and view all the answers

What is a permission in the context of access control?

<p>A security setting that determines the level of access an account has to a particular resource (A)</p> Signup and view all the answers

What is an access control entry (ACE) used for within an ACL?

<p>Identifies a subject and the permissions it has for the resource (C)</p> Signup and view all the answers

How are subjects typically identified in network firewalls?

<p>By MAC address, IP address, and/or port number (B)</p> Signup and view all the answers

What is the principle of implicit deny in ACL security?

<p>Unless there is a rule specifying that access should be granted, any request for access is denied (B)</p> Signup and view all the answers

What is the complementary principle to implicit deny in access control?

<p>Least Privilege (D)</p> Signup and view all the answers

What is the identifier used in the underlying permission entries in Windows directory permissions?

<p>Unique security ID (SID) (D)</p> Signup and view all the answers

What happens if an account is deleted and then recreated with the same username in Windows directory permissions?

<p>The SID will still be different, and any permissions assigned to the account will have to be recreated (D)</p> Signup and view all the answers

How are firewall policies typically processed when filtering access requests?

<p>In order from top to bottom, with the last (default) rule being to refuse the request if it doesn't fit any of the rules (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser