18 Questions
0 Views
3.5 Stars

Privileged Access Management Best Practices

Learn about the best practices of Privileged Access Management and how it reduces risks, ensures confidentiality, integrity, and availability of administrative access. Understand the process of provisioning users including new employee onboarding.

Created by
@ProtectiveRainforest8258
1/18
Find out if you were right!
Create an account to continue playing and access all the benefits such as generating your own quizzes, flashcards and much more!
Quiz Team

Access to a Library of 520,000+ Quizzes & Flashcards

Explore diverse subjects like math, history, science, literature and more in our expanding catalog.

Questions and Answers

Which type of access control policy is enforced uniformly across all subjects and objects within the boundary of an information system?

Mandatory access control (MAC)

Which access control policy allows the owner of a resource to control access to that resource?

Discretionary access control (DAC)

Which of the following is NOT a type of logical access control?

Security guards

Which of the following is an example of a physical access control?

<p>Locked doors/gates</p> Signup and view all the answers

Which access control policy sets up user permissions based on roles?

<p>Role-based access control (RBAC)</p> Signup and view all the answers

What is the purpose of two-person integrity?

<p>To ensure that no single user has complete control over a critical process</p> Signup and view all the answers

Which type of access control model is considered the most restrictive, where the system owner defines and enforces the access control policy?

<p>Mandatory Access Control (MAC)</p> Signup and view all the answers

Which access control mechanism allows users to create, modify, and delete access control rules for the resources they own?

<p>Discretionary Access Control (DAC)</p> Signup and view all the answers

Which of the following is NOT an example of a physical access control?

<p>Configuration settings or parameters stored as data</p> Signup and view all the answers

Which access control model uses roles to manage permissions and access privileges?

<p>Role-Based Access Control (RBAC)</p> Signup and view all the answers

Which of the following is NOT a common activity performed during the 'offboarding' process for a terminated employee?

<p>Creating a new baseline account for the employee</p> Signup and view all the answers

Which of the following is NOT a benefit of Privileged Access Management (PAM)?

<p>Confirming availability by never providing administrative access when needed</p> Signup and view all the answers

Which of the following is an example of a physical access control?

<p>Fences and locks</p> Signup and view all the answers

What is the principle of least privilege?

<p>Users and programs should have only the minimum privileges necessary to complete their tasks</p> Signup and view all the answers

Which of the following is a form of mandatory access control (MAC)?

<p>Bell-LaPadula model</p> Signup and view all the answers

What is the purpose of segregation of duties (or separation of duties)?

<p>To prevent collusion and reduce insider threats by requiring multiple individuals to complete a process</p> Signup and view all the answers

What is a privileged account in the context of information security?

<p>An account with approved authorizations for a privileged user</p> Signup and view all the answers

What is the fundamental concept behind role-based access control (RBAC)?

<p>Granting access based on user roles and associated permissions</p> Signup and view all the answers

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Authorization and Access Control Quiz
5 questions
CyberArk PAM: Key Features
20 questions
CyberArk PAM Key Features
444 questions
Use Quizgecko on...
Browser
Browser