Lesson 8 Implementing Identity and Account Management Controls
Lesson 8 Implementing Identity and Account Management Controls
1.A
2.C
Unless the phishing email is part of a penetration test, other members of the
IT team likely know a member of their team is sending a simulated phishing
email.
A bug bounty is a program operated by a software vendor or website operator
where individuals receive rewards for reporting vulnerabilities. While
contractors may perform pen tests on a contractual basis, a bug bounty
program is a way of crowd sourcing vulnerability detection.
3.B
Mandatory Access Control (MAC) uses a security clearance level as the rule
to determine a user’s rights
4.ABC
Authentication and authorization for a RESTful API is often implemented using the
Open Authorization (OAuth) protocol.
OpenID is an identity federation method enabling users authentication on cooperating
websites by a third-party authentication service.
5.A
Federation means the company trusts the accounts created and managed by a different
network. The networks establish trust relationships, so the identity of a user
(principal) from network A (identity provider), can be trusted as authentic by network
B (service provider).
SSO (Single-Sign On) means a user authenticates to a system once, to access the
resources the system has granted rights to use. This is not an example of a trust
relationship.
6.C
Usage auditing means configuring the security log to record key indicators, then
reviewing the logs for suspicious activity. This process does not involve reviewing
user privileges.
7.A
Adding the security group 'Finance' with 'Read' permissions to the Invoice folder will
allow any user that is added to the Finance group to access the folder with the proper
read-only permissions.
Adding individual user accounts with 'Read' permissions to the Invoice folder will
grant the proper permissions, but this is not as manageable. Adding and removing
individual user accounts will prove a tedious administrative task in the long-run.
Adding the security group 'Finance' with 'Modify' permissions to the Invoice folder
will allow any user that is added to the Finance group to access the folder, but will
also allow the users to modify any files, which does not meet the requirements.
Adding individual user accounts with 'Modify' permissions to the Invoice folder will
grant users too much access than s required. Adding and removing individual user
accounts will also prove a tedious administrative task in the long-run.
8.D
9.AB
Capture the Flag (CTF) is usually used in ethical hacker training programs and
gamified competitions. Participants complete a series of challenges within a
virtualized computing environment to discover a flag that represents a vulnerability or
attack to overcome.
User-based training consists of training in which all users of certain systems and
accesses are trained equally on holistic concepts.
Staff training should focus on user roles, which require different levels of security
training, education, or awareness.
10.B
Usage auditing refers to configuring the security log to record key indicators and then
reviewing the logs for suspicious activity. Behavior recorded by event logs that differs
from expected behavior may indicate everything from a minor security infraction to a
major incident.
11.C
This company is using a Single Sign-On (SSO) policy. This means that a user only
has to authenticate to a system once, to gain access to all the resources to which the
system has granted rights to the user. An example is when a user authenticates with
Windows, and also authenticates with the Windows domain's SQL Server, and
Exchange Server services.
Least privilege means that the system grants rights necessary for users to perform
their job and no more.
Implicit deny is the foundation of a system's access control. This means that unless
there is a rule specifying that a system grants access to a user, the system will deny
any access request.
The system generates an access key for a user when the user supplies authentication
data. The system compares it with the server's security database, and both must match.
The server security service generates the access key.
12.D
A clean desk policy means that each employee's work area should be free
from any documents left there. The policy aims to prevent sensitive
information from being obtained by unauthorized staff or guests at the
workplace.
Some companies may try to prevent staff from bringing personal devices on
site, because such devices represent a data exfiltration risk. When connected
to an enterprise system, personal electronic devices pose security
complications.
13.B
A distinguished name is a unique identifier for any given resource within an X.500-
like directory and made up of attribute=value pairs, separated by commas. The most
specific attribute lists first, and then successive attributes become progressively
broader.
Also referred to as the relative distinguished name, the most specific attribute (in this
case, system1) uniquely identifies the object within the context of successive attribute
values.
The directory schema describes the types of attributes, what information they contain,
and the way attributes define object types. Some of the attributes commonly used
include Common Name (CN), Organizational Unit (OU), Organization (O), Country
(C), and Domain Component (DC).
14.D
A clean desk policy means that each employee's work area should be free
from any documents left there.
Capture the Flag (CTF) is a training technique and not a personnel policy that
is typically used in ethical hacker training programs and gamified
competitions.
15. BD
Within each root-level parent OU, use separate child OUs for different types of
objects such as servers, client systems, users and groups. Be consistent.
Do not create too many root-level containers or nest containers too deeply. They
should not be more than five levels.
16.AB
Smart cards or USB keys can store a user's certificate and private key, which
can authenticate to different PCs and mobile devices. A stolen laptop and key
represent a vulnerability.
A time of day policy establishes authorized logon hours for an account. Time-
and location-based policies prevent users from logging in outside of
authorized hours and locales.
17.D
In DAC, the owner has full control over the resource, meaning that he or she
can modify its ACL to grant rights to others. DAC is the most flexible and
weakest control model.
With DAC, decision-making lies with the resource owner. In rule-based
access control and mandatory access control (MAC), it lies with the system
owner (that is, the controls are enforced system-wide and cannot be
countermanded or accepted by users "within" the system)
18.B
An exit interview (or offboarding) is the process of ensuring that an employee leaves
a company gracefully, and that company assets remain secure.
When an employee leaves, proper account management involves disabling the user’s
account and privileges.
19.AB
20.D
21.C
The System account, not the Local Service account, creates the host
processes that start Windows before the user logs on.
The Network Service account and the Local Service account have the same
privileges as the standard user account. Standard users have limited
privileges, typically with access to run programs, create, and modify files only
belonging to their profile.
Any process created using the System account will have full privileges over
the local computer. The System account has the most privileges of any
Windows account.