Logical Security Controls Quiz
12 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of control involves user authentication, antivirus software, and firewalls?

  • Logical controls (correct)
  • Procedural controls
  • Physical controls
  • Network controls

What is the AAA triad related to in logical security?

  • Accounting, Authorization, Authentication
  • Authentication, Authorization, Accounting
  • Authentication, Authorization, Access (correct)
  • Access, Authorization, Authentication

Which control type works in the built environment to control access to sites?

  • Network controls
  • Procedural controls
  • Logical controls
  • Physical controls (correct)

What does the term 'Authentication' mean in the context of an access control system?

<p>Ensuring that an account can only be operated by someone who can supply the correct credentials (A)</p> Signup and view all the answers

What is a permission in the context of resource access control?

<p>A security setting that determines the level of access an account has to a particular resource (B)</p> Signup and view all the answers

What does Implicit Deny mean in the context of ACL security?

<p>Unless there is a rule specifying that access should be granted, any request for access is denied (C)</p> Signup and view all the answers

What is the principle of least privilege in the context of resource access control?

<p>A user should be granted the minimum possible rights necessary to perform the job (C)</p> Signup and view all the answers

What is an Access Control List (ACL) in the context of resource access control?

<p>A list of permissions attached to each resource to determine access levels for accounts (B)</p> Signup and view all the answers

What does a subject represent in an Access Control List (ACL)?

<p>A human user, a computer, or a software service (B)</p> Signup and view all the answers

How are subjects identified in network firewall ACLs?

<p>By MAC address, IP address, and/or port number (A)</p> Signup and view all the answers

What happens if an account is deleted and then recreated with the same username in Windows permissions?

<p>The security ID (SID) will still be different, and any permissions assigned to the account will have to be recreated (D)</p> Signup and view all the answers

How are firewall access requests processed in relation to the principle of implicit deny?

<p>The rules are processed in order from top to bottom, and if a request does not fit any of the rules, it is denied (D)</p> Signup and view all the answers

More Like This

Enhancing Physical Security Measures
10 questions
Access Control and Security Measures
26 questions
Access Control Measures in Finance
4 questions
Use Quizgecko on...
Browser
Browser