3.7 Flashcards

1
Q

What is the Identity provider?

IdP

A

Authentican as as Service (Aaas)
A list of entities
Commonly used by SSO applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some attributes of (IdP)

A

An identifier
- provides identification
personal attributes
- Name or email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do certificates do? What so digital certificates do?

A

Certificates bind the identity of the certificate owner to a public and private key
Encrypts data, create digital signatures
Digital certificate
- Assigned to a person or a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a smart card and a USB token

A

Smart card integrates with devices and may require a PIN. USB token has the certificate on the USB device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSH keys

A

Use a key instead of username and password.

Public and private keys are critical for automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSH key-based authentication

A

Create a public/private key pair
- ssh-keygen
Copy the public key to the SSH
- ssh-copy-id user@host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of account is associated with a specific person. The computer associates the user with a specific identification number

A

User account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is it difficult to manage an audit trail with a shared or generic account?

A

Yes, it is hard to track who was working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some privileges listed with a guest account

A

No access to change settings, modify applications, view other user’s files . Not the default removed from Windows 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are service accounts

A

Used exclusively by services running on a computer. For example web server or database server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Do privileged accounts have one of the following or all of the following?
- Elevated access to one or more systems
Complete access to the system

A

All of the listed elements are associated with privileged accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Should privilege accounts be highly secured

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are account policies

A

Control access to an account. Confirm authentication policies are in place and in line with password policies, authentication factor policies, and other considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is permission auditing

A

Make sure everyone has the correct permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name some location based policies

A
Network location
Geolocation
Geofencing
Geotagging 
Location-based access rules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between geofencing and geotagging

A

Geofencing
- automatically allow or restrict access when the user is in a particular location
Geotagging
-Add location metadata to a document or file
-Latitude and longitude, distance, time stamps

17
Q

Location-based and time-based access rules

A

Location-based
- User IP address needs to be associated with the right location to access app or other account abilities
Time-based
- allowed to access lab or other work related account abilities in a certain time frame