Podcast
Questions and Answers
Which type of control involves user authentication, antivirus software, and firewalls?
Which type of control involves user authentication, antivirus software, and firewalls?
- Logical controls (correct)
- Procedural controls
- Physical controls
- Network controls
What is the AAA triad related to in logical security?
What is the AAA triad related to in logical security?
- Accounting, Authorization, Authentication
- Authentication, Authorization, Accounting
- Authentication, Authorization, Access (correct)
- Access, Authorization, Authentication
Which control type works in the built environment to control access to sites?
Which control type works in the built environment to control access to sites?
- Network controls
- Procedural controls
- Logical controls
- Physical controls (correct)
What does the term 'Authentication' mean in the context of an access control system?
What does the term 'Authentication' mean in the context of an access control system?
What is a permission in the context of resource access control?
What is a permission in the context of resource access control?
What does Implicit Deny mean in the context of ACL security?
What does Implicit Deny mean in the context of ACL security?
What is the principle of least privilege in the context of resource access control?
What is the principle of least privilege in the context of resource access control?
What is an Access Control List (ACL) in the context of resource access control?
What is an Access Control List (ACL) in the context of resource access control?
What does a subject represent in an Access Control List (ACL)?
What does a subject represent in an Access Control List (ACL)?
How are subjects identified in network firewall ACLs?
How are subjects identified in network firewall ACLs?
What happens if an account is deleted and then recreated with the same username in Windows permissions?
What happens if an account is deleted and then recreated with the same username in Windows permissions?
How are firewall access requests processed in relation to the principle of implicit deny?
How are firewall access requests processed in relation to the principle of implicit deny?