Access is allowed or denied to resource objects based on a set of rules defined by a system administrator.
What is Rule Based Access Control
300
MAC flooding; an attack which can overflow the CAM table of a switch happens on this layer of the OSI model.
Layer 2 or Data Link
300
This type of firewall keeps a record of the state of a connection between an internal and external device.
Stateful Packet Filtering
300
Bob from accounting has decided he's fed up with the poor wireless signal he gets from his desk, one day he brings in his own wireless router and hooks it up under his desk. What has Bob done?
Set up a Rogue Access Point
300
This is designed to catch data-transmission errors.
Checksum
400
This is the strictest of all levels of control. It takes a hierarchical approach to controlling access to resources.
What is Mandatory Access Control
400
The PEBKAC error occurs at this imaginary layer of the OSI model.
Layer 8
400
This authentication solution uses tickets to provide access to resources.
Kerberos
400
This bluetooth attach allows us to access unauthorized information from a wireless device and copy files such as e-mails, calendars, and contact lists.
Bluesnarfing
400
This encryption method was designed by IBM and was originally named Lucifer.
DES
500
List one of the two weaknesses that we covered about Discretionary Access Control.
Relies on decisions by the end user.
or
Permissions will be inherited by programs that the subject executes.
500
TCP and UDP operate at this layer of the OSI model.
Layer 4 or Transport
500
When creating a network, you would most likely place a web server in this area.
DMZ
500
These two practices should be done when implementing port security.
1) Disable Unused ports 2) MAC limiting and filtering
500
This type of cryptography is also known as public key cryptography meaning that it uses a public and private key that are mathematically related, Diffie-Hellman is an example of this type of cryptography