WGU C836 Fundamentals of Information Security, Exam Questions and answers, 100% Accurate, VERIFIED.
WGU C836 Fundamentals of Information Security, Exam Questions and answers, 100% Accurate, VERIFIED. What are the 4 basic tasks for access controls? ACL Allowing access, denying access, limiting access, and revoking access. What is a Sandbox? A set of resources devoted to a program, outside of which the entity cannot operate. This is an access control method to prevent the untested code from accessing other resources they shouldn't be. How does a linux File ACL work in terms of permissions and user groupings? There is a user, group, and other and their permissions are in that order. Each category has its own (RWX) read, write, and execute permissions. An example is drwxrw-r--. The d is the file type which in this case means directory. The user can read write and execute, the group can read and write, and other users can only read. What do Network ACLs use to allow or deny access? 3 Network ACLs will use port numbers, MAC addresses, and IP addresses to allow or deny access. Network ACLs can be used in switches, routers, firewall devices, and software firewalls. What is blackholing and what is it used for? Web and mail servers use blackholing to block out known attacks, spammers and other undesirable traffic on a large scale. This practice is commonly referred to as blackholing, because any traffic to such filtered destinations is simply dropped and appears to have vanished into a black hole from the perspective of the sender. How does capability based security allow or deny authorization? capabilities are oriented around the use of a token that controls our access. in capability-based systems, the right to access a resource is based entirely on possession of the token, and not who possesses it. What is the confused deputy problem? What authorization system is it used in and what system stops it? It is when the software has a higher authorizations than the person who is using it. They can use the authorization of the software to access resources they as a person aren't authorized to. Confused deputy is seen in ACL systems and is stopped by capability based authorization systems. What are CSRF and clickjacking/user interface redressing attacks? How can they be stopped? They are common client-side attacks. cross site request forgery places a link on a site you trust or in and e-mail and when you click that link it automatically makes a request on the site you are authenticated to. The request is seen as being made by you and could be used to transfer bank money or to buy things on amazon. Clickjacking is when an attacker modifies a site and creates an invisible layer over something a user wouldn't normally click. When they click the malicious code is executed. This kind of attacks can be prevented by NoScript for firefox and GuardedID for internet explorer. 1. Name the five Access control Methodologies/Models. 2. How is access/authorization decided for each one? 3. Give an example of what situation would each model be used in 1. Discretionary Access control DAC- based on the owner of the resource. If I made a network share I would decide who can have access. 2. Mandatory Access Control MAC- based on a group or individual who has authority to set access on resources. This is used in the military who give access based on a sensitivity label such as secret. 3. Role based access control RBAC- based on an authority individual or group but also based on the role the person being granted access is performing. This could be used for a sales person in an online retail store that would give him access to sensitive information about customer's payment information. 4. Attribute Based Access Control ABAC- based on attributes of a subject/person, resource, or environment. 5. Multilevel access control- based on more than one methodology. Used in gov and mil organizations. Bell-Lapadula is a multi-level access control model. 1. What is the primary concern for this model? 2. what are its two security properties and what do t
Escuela, estudio y materia
- Institución
- Western Governors University
- Grado
- WGU C836 Fundamentals Of Information Security
Información del documento
- Subido en
- 24 de octubre de 2023
- Número de páginas
- 8
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
wgu c836 fundamentals of information security ex
Documento también disponible en un lote