Topic 1: Access Control
Which of the following is the FIRST step in protecting data's confidentiality?
A.
Install a firewall
B.
Implement encryption
C.
Identify which information is sensitive
D.
Review all user access rights
Identify which information is sensitive
In order to protect the confidentiality of the data.
The following answers are incorrect because :
Install a firewall is incorrect as this would come after the information has been identified for
sensitivity levels. Implement encryption is also incorrect as this is one of the mechanisms to protect the data
once it has been identified.
Review all user access rights is also incorrect as this is also a protection mechanism for the
identified information.
Reference : Shon Harris AIO v3 , Chapter-4 : Access Control , Page : 126
In biometric identification systems, the parts of the body conveniently available for
identification are:In biometric identification systems, the parts of the body conveniently available for
identification are
A.
neck and mouth
B.
hands, face, and eyes
C.
feet and hair
D.
voice and neck
hands, face, and eyes
Today implementation of fast, accurate, reliable, and user-acceptable
biometric identification systems are already under way. Because most identity
authentication takes place when a people are fully clothed (neck to feet and wrists), the
parts of the body conveniently available for this purpose are hands, face, and eyes.
From: TIPTON, Harold F. & KRAUSE, MICKI, Information Security Management
Handbook, 4th Edition, Volume 1, Page 7.
What is the PRIMARY use of a password?
A.
Allow access to files
B.
Identify the user.
C.
Authenticate the user.
D.
Segregate various user's accesses.
Authenticate the user.
Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation
Which authentication technique best protects against hijacking?
A.
Static authentication
B.
Continuous authentication
C.
Robust authentication
D.
Strong authentication
Continuous authentication
A continuous authentication provides protection against impostors who can
see, alter, and insert information passed between the claimant and verifier even after the
claimant/verifier authentication is complete. This is the best protection against hijacking.
Static authentication is the type of authentication provided by traditional password schemes
and the strength of the authentication is highly dependent on the difficulty of guessing
passwords. The robust authentication mechanism relies on dynamic authentication data
that changes with each authenticated session between a claimant and a verifier, and it
does not protect against hijacking. Strong authentication refers to a two-factor
authentication (like something a user knows and something a user is).
Source: TIPTON, Harold F. & KRAUSE, Micki, Information Security Management
Handbook, 4th edition (volume 1), 2000, CRC Press, Chapter 3: Secured Connections to
External Networks (page 51).
Which of the following questions is less likely to help in assessing identification and
authentication controls?
A.
Is a current list maintained and approved of authorized users and their access?
B.
Are passwords changed at least every ninety days or earlier if needed?
C.
Are inactive user identifications disabled after a specified period of time?
D.
Is there a process for reporting incidents?
Is there a process for reporting incidents?
Identification and authentication is a technical measure that prevents
unauthorized people (or unauthorized processes) from entering an IT system. Access
control usually requires that the system be able to identify and differentiate among users.
Reporting incidents is more related to incident response capability (operational control)
than to identification and authentication (technical control).
Source: SWANSON, Marianne, NIST Special Publication 800-26, Security Self-
Assessment Guide for Information Technology Systems, November 2001 (Pages A-30 to
A-32).
Which of the following is NOT a form of detective administrative control?
A.
Rotation of duties
B.
Required vacations
C.
Separation of duties
D.
Security reviews and audits
Separation of duties
Detective administrative controls warn of administrative control violations.
Rotation of duties, required vacations and security reviews and audits are forms of
detective administrative controls. Separation of duties is the practice of dividing the steps in
a system function among different individuals, so as to keep a single individual from
subverting the process, thus a preventive control rather than a detective control.
Source: DUPUIS, Cl?ment, Access Control Systems and Methodology CISSP Open Study
Guide, version 1.0 (march 2002).
Like the Kerberos protocol, SESAME is also subject to which of the following?
A.
timeslot replay
B.
password guessing
C.
symmetric key guessing
D.
asymmetric key guessing
password guessing
Sesame is an authentication and access control protocol, that also supports
communication confidentiality and integrity. It provides public key based authentication
along with the Kerberos style authentication, that uses symmetric key cryptography.
Sesame supports the Kerberos protocol and adds some security extensions like public key
based authentication and an ECMA-style Privilege Attribute Service.
The users under SESAME can authenticate using either symmetric encryption as in
Kerberos or Public Key authentication. When using Symmetric Key authentication as in
Kerberos, SESAME is also vulnerable to password guessing just like Kerberos would be.
The Symmetric key being used is based on the password used by the user when he logged
on the system. If the user has a simple password it could be guessed or compromise. Even
thou Kerberos or SESAME may be use, there is still a need to have strong password
discipline.
The Basic Mechanism in Sesame for strong authentication is as follow:The user sends a request for authentication to the Authentication Server as in Kerberos,
except that SESAME is making use of public key cryptography for authentication where the
client will present his digital certificate and the request will be signed using a digital
signature. The signature is communicated to the authentication server through the
preauthentication fields. Upon receipt of this request, the authentication server will verifies
the certificate, then validate the signature, and if all is fine the AS will issue a ticket granting
ticket (TGT) as in Kerberos. This TGT will be use to communicate with the privilage
attribute server (PAS) when access to a resource is needed.
Users may authenticate using either a public key pair or a conventional (symmetric) key. If
public key cryptography is used, public key data is transported in preauthentication data
fields to help establish identity.
Kerberos uses tickets for authenticating subjects to objects and SESAME uses Privileged
Attribute Certificates (PAC), which contain the subject’s identity, access capabilities for the
object, access time period, and lifetime of the PAC. The PAC is digitally signed so that the
object can validate that it came from the trusted authentication server, which is referred to
as the privilege attribute server (PAS). The PAS holds a similar role as the KDC within
Kerberos. After a user successfully authenticates to the authentication service (AS), he is
presented with a token to give to the PAS. The PAS then creates a PAC for the user to present to the resource he is trying to access.
Reference(s) used for this question:
http://srg.cs.uiuc.edu/Security/nephilim/Internal/SESAME.txt
and
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten
Domains of Computer Security, 2001, John Wiley & Sons, Page 43.
Which type of control is concerned with restoring controls?
A.
Compensating controls
B.
Corrective controls
C.
Detective controls
D.
Preventive controls
Corrective controls
Corrective controls are concerned with remedying circumstances and
restoring controls.
Detective controls are concerned with investigating what happen after the fact such as logs
and video surveillance tapes for example.
Compensating controls are alternative controls, used to compensate weaknesses in other
controls.
Preventive controls are concerned with avoiding occurrences of risks.
Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation
Which division of the Orange Book deals with discretionary protection (need-to-know)?
A.
D
B.
C
C.
B
D.
A
C
C deals with discretionary protection. See matric below:
C:\Users\MCS\Desktop\1.jpg
TCSEC Matric
The following are incorrect answers:
D is incorrect. D deals with minimal security.
B is incorrect. B deals with mandatory protection.
A is incorrect. A deals with verified protection.
Reference(s) used for this question:
CBK, p. 329 – 330 and Shon Harris, CISSP All In One (AIO), 6th Edition , page 392-393
Another type of access control is lattice-based access control. In this type of control a
lattice model is applied. How is this type of access control concept applied?
A.
The pair of elements is the subject and object, and the subject has an upper bound
equal or higher than the upper bound of the object being accessed.
B.
The pair of elements is the subject and object, and the subject has an upper bound
lower then the upper bound of the object being accessed.
C.
The pair of elements is the subject and object, and the subject has no special upper or
lower bound needed within the lattice.
D.
The pair of elements is the subject and object, and the subject has no access rights in
relation to an object.
The pair of elements is the subject and object, and the subject has an upper bound
equal or higher than the upper bound of the object being accessed.
To apply this concept to access control, the pair of elements is the subject
and object, and the subject has to have an upper bound equal or higher than the object
being accessed.
WIKIPEDIA has a great explanation as well:
In computer security, lattice-based access control (LBAC) is a complex access control
based on the interaction between any combination of objects (such as resources,
computers, and applications) and subjects (such as individuals, groups or organizations).
In this type of label-based mandatory access control model, a lattice is used to define the
levels of security that an object may have and that a subject may have access to. The
subject is only allowed to access an object if the security level of the subject is greater than
or equal to that of the object Reference(s) used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten
Domains of Computer Security, 2001, John Wiley & Sons, Page 34.
andhttp://en.wikipedia.org/wiki/Lattice-based_access_control
Page 13 out of 105 Pages |
Previous |