Access Control
OSI Stuff
Security
Can't Trust Em
!@$DSW
100
True or False; DAC is the most restrictive access control model.
False
100
Layer 1 of the OSI model
What is Physical
100
This device acts as a substitute on behalf of a primary device.
Proxy
100
You would implement this to ensure that users can only access their company devices during regular business hours.
Time of day restrictions
100
This is data that is waiting to be encrypted.
Plaintext
200
This access control method is considered more "real world" than others.
What is Role Based Access Control
200
A hub operates at which level of the OSI model?
Layer 1 or Physical
200
This device can take several actions when it receives a packet, allow, block, prompt.
Firewall
200
The policy of only giving users the bare minimum credentials so that they can perform their job.
Least privilege
200
List one of the five functions of cryptography.
1.) Confidentiality 2.) Integrity 3.) Availability 4.) Authenticity 5.) Nonrepudiation
300
Access is allowed or denied to resource objects based on a set of rules defined by a system administrator.
What is Rule Based Access Control
300
MAC flooding; an attack which can overflow the CAM table of a switch happens on this layer of the OSI model.
Layer 2 or Data Link
300
This type of firewall keeps a record of the state of a connection between an internal and external device.
Stateful Packet Filtering
300
Bob from accounting has decided he's fed up with the poor wireless signal he gets from his desk, one day he brings in his own wireless router and hooks it up under his desk. What has Bob done?
Set up a Rogue Access Point
300
This is designed to catch data-transmission errors.
Checksum
400
This is the strictest of all levels of control. It takes a hierarchical approach to controlling access to resources.
What is Mandatory Access Control
400
The PEBKAC error occurs at this imaginary layer of the OSI model.
Layer 8
400
This authentication solution uses tickets to provide access to resources.
Kerberos
400
This bluetooth attach allows us to access unauthorized information from a wireless device and copy files such as e-mails, calendars, and contact lists.
Bluesnarfing
400
This encryption method was designed by IBM and was originally named Lucifer.
DES
500
List one of the two weaknesses that we covered about Discretionary Access Control.
Relies on decisions by the end user. or Permissions will be inherited by programs that the subject executes.
500
TCP and UDP operate at this layer of the OSI model.
Layer 4 or Transport
500
When creating a network, you would most likely place a web server in this area.
DMZ
500
These two practices should be done when implementing port security.
1) Disable Unused ports 2) MAC limiting and filtering
500
This type of cryptography is also known as public key cryptography meaning that it uses a public and private key that are mathematically related, Diffie-Hellman is an example of this type of cryptography
Asymmetric Cryptography
M
e
n
u