Logical Security Controls Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which type of control involves user authentication, antivirus software, and firewalls?

  • Logical controls (correct)
  • Procedural controls
  • Physical controls
  • Network controls

What is the AAA triad related to in logical security?

  • Accounting, Authorization, Authentication
  • Authentication, Authorization, Accounting
  • Authentication, Authorization, Access (correct)
  • Access, Authorization, Authentication

Which control type works in the built environment to control access to sites?

  • Network controls
  • Procedural controls
  • Logical controls
  • Physical controls (correct)

What does the term 'Authentication' mean in the context of an access control system?

<p>Ensuring that an account can only be operated by someone who can supply the correct credentials (A)</p> Signup and view all the answers

What is a permission in the context of resource access control?

<p>A security setting that determines the level of access an account has to a particular resource (B)</p> Signup and view all the answers

What does Implicit Deny mean in the context of ACL security?

<p>Unless there is a rule specifying that access should be granted, any request for access is denied (C)</p> Signup and view all the answers

What is the principle of least privilege in the context of resource access control?

<p>A user should be granted the minimum possible rights necessary to perform the job (C)</p> Signup and view all the answers

What is an Access Control List (ACL) in the context of resource access control?

<p>A list of permissions attached to each resource to determine access levels for accounts (B)</p> Signup and view all the answers

What does a subject represent in an Access Control List (ACL)?

<p>A human user, a computer, or a software service (B)</p> Signup and view all the answers

How are subjects identified in network firewall ACLs?

<p>By MAC address, IP address, and/or port number (A)</p> Signup and view all the answers

What happens if an account is deleted and then recreated with the same username in Windows permissions?

<p>The security ID (SID) will still be different, and any permissions assigned to the account will have to be recreated (D)</p> Signup and view all the answers

How are firewall access requests processed in relation to the principle of implicit deny?

<p>The rules are processed in order from top to bottom, and if a request does not fit any of the rules, it is denied (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser