3.8 - Given a scenario, implement authentication and authorization solutions. Flashcards

1
Q

Authentication management

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Password keys

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Password vaults

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TPM

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HSM

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Knowledge-based authentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication/authorization

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication/authorization- EAP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication/authorization - Challenge-Handshake Authentication Protocol (CHAP)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication/authorization - Password Authentication
Protocol (PAP)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication/authorization - 802.1X

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication/authorization - RADIUS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication/authorization - Single sign-on (SSO)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication/authorization - Security Assertion Markup Language (SAML)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication/authorization - Terminal Access Controller
Access Control System Plus (TACACS+)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authentication/authorization - OAuth

A
17
Q

Authentication/authorization - OpenID

A
18
Q

Authentication/authorization - Kerberos

A
19
Q

Access control schemes

A
20
Q

Access control schemes - Attribute-based access control (ABAC)

A
21
Q

Access control schemes Role-based access control

A
22
Q

Access control schemes - MAC

A
22
Q

Access control schemes - Rule-based access control

A
23
Q

DAC

A

Discretionary access control

Used in most operating systems
– A familiar access control model
*
You create a spreadsheet
– As the owner, you control who has access
– You can modify access at any time
*
Very flexible access control
– And very weak security

24
Q

Access control schemes - Conditional access

A
25
Q

Access control schemes - Privileged access management

A
26
Q

Access control schemes - Filesystem permissions

A