This CISSP Prep- Access Control Questions quiz assesses knowledge on managing and securing access to resources. It covers defining access permissions, understanding different types of access controls, and the role of least privilege in security protocols.
Access controls are a collection of technical controls that permit access to authorized users, systems, and applications.
Access controls help protect against threats and vulnerabilities by reducing exposure to unauthorized activities and providing access to information and systems to only those who have been approved.
Access control is the employment of encryption solutions to protect authentication information during log-on.
Access controls help protect against vulnerabilities by controlling unauthorized access to systems and information by employees, partners, and customers.
Rate this question:
Discretionary access control
Separation of duties
Least privilege
Rotation of duties
Rate this question:
Detective, corrective, monitoring, logging, recovery, classifi cation, and directive
Directive, deterrent, preventative, detective, corrective, compensating, and recovery
Authorization, identifi cation, factor, corrective, privilege, detective, and directive
Identifi cation, authentication, authorization, detective, corrective, recovery, and directive
Administrative, physical, and technical
Identifi cation, authentication, and authorization
Mandatory, discretionary, and least privilege
Access, management, and monitoring
Rate this question:
Brute force
Rainbow table attack
Memory tabling
One-time hashing
Rate this question:
Something you know
Something you have
Something you are
A combination of two listed above
Rate this question:
Single point of failure
Asymmetric key compromise
Use of dynamic passwords
Limited lifetimes for authentication credentials
Rate this question:
Validation
Need to know
Consensus
Verifi cation
Rate this question:
Resistance to counterfeiting
Technology type
User acceptance
Reliability and accuracy
Rate this question:
Revoking credentials
Encryption
Communications
Placement
Rate this question:
Is unique to mandatory access control
Is independent of owner input
Is based on user job functions
Can be compromised by inheritance
Rate this question:
Another name for access controls
A set of technologies and processes intended to off er greater effi ciency in the management of a diverse user and technical environment
A set of technologies and processes focused on the provisioning and decommissioning of user credentials
A set of technologies and processes used to establish trust relationships with disparate systems
Rate this question:
Consistent time-out enforcement across platforms
A compromised password exposes all authorized resources
Use of multiple passwords to remember
Password change control
Rate this question:
Privileges associated with each system, service, or application, and the defi ned roles within the organization to which they are needed, should be identified and clearly documented.
Privileges should be managed based on least privilege. Only rights required to perform a job should be provided to a user, group, or role
An authorization process and a record of all privileges allocated should be maintained. Privileges should not be granted until the authorization process is complete and validated.
Any privileges that are needed for intermittent job functions should be assigned to multiple user accounts, as opposed to those for normal system activity related to the job function.
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.