4.0 Identity and Access Management Flashcards

1
Q

Standards, best practices, and guidelines for effective security risk management. Some frameworks are general in nature, while others are specific to industry or technology types.

A

cybersecurity frameworks (CSF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides and research.

A

National Institute of Standards and Technology (NIST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.

A

security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An analysis that measures the difference between the current and desired states in order to help assess the scope of work included in a project.

A

Gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process by which a user account (and its credentials) is issued to the correct person. Sometimes referred to as enrollment.

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications.

A

identity and access management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.

A

authentication, authorization, and accounting (AAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In zero trust architecture, functions that define policy and determine access decisions.

A

control plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security settings that control access to objects including file system items and network resources.

A

permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An access control model where each resource is protected by an access control list (ACL) managed by the resource’s owner (or owners).

A

Discretionary access control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An access control model where resources are protected by inflexible, system-defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label).

A

Mandatory access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.

A

Role-based access control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A group account is a collection of user accounts that is useful when establishing file permissions and user rights because when many individuals need the same level of access, a group could be established containing all the relevant users.

A

group account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.

A

Attribute-based access control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A nondiscretionary access control technique that is based on a set of operational rules or restrictions to enforce a least privileges permissions policy.

A

Rule-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The process of deploying an account, host, or application to a target production environment. This involves proving the identity or integrity of the resource, and issuing it with credentials and access permissions.

A

Provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The process of removing an account, host, or application from the production environment. This requires revoking any privileged access that had been assigned to the object.

A

Deprovisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The value assigned to an account by Windows and that is used by the operating system to identify that account.

A

security identifier (SID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

On a Windows domain, a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, and so on.

A

group policy objects (GPOs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The identification or estimation of the physical location of an object, such as a radar source, mobile phone, or Internet-connected computing device.

A

geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Policies or configuration settings that limit a user’s access to resources.

A

time-of-day restrictions policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Authentication token generated by a cryptoprocessor on a dedicated hardware device. As the token is never transmitted directly, this implements an ownership factor within a multi-factor authentication scheme.

A

Hard authentication token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A security device similar to a credit card that can store authentication information, such as a user’s private key, on an embedded cryptoprocessor.

A

Smart cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Portable HSM with a computer interface, such as USB or NFC, used for multi-factor authentication.

A

Security key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

OTP sent to a registered number or email account or generated by an authenticator app as a means of two-step verification when authenticating account access.

A

Soft authentication token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Multi- factor authentication scheme that uses ownership and biometric factors, but not knowledge factors.

A

Passwordless

28
Q

A challenge-response authentication protocol created by Microsoft for use in its products.

A

NT LAN Manager (NTLM) authentication

29
Q

Capability of an authenticator or other cryptographic module to prove that it is a root of trust and can provide reliable reporting to prove that a device or computer is a trustworthy platform.

A

Attestation

30
Q

A framework for implementing authentication providers in Linux.

A

Pluggable authentication module (PAM)

31
Q

A network service that stores identity information about all the objects in a particular network, including users, groups, servers, client computers, and printers.

A

Directory service

32
Q

Protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information.

A

Lightweight Directory Access Protocol (LDAP)

33
Q

A collection of attributes that define a unique identifier for any given resource within an X.500-like directory.

A

Distinguished name (DN)

34
Q

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

A

Single sign-on (SSO)

35
Q

A single sign-on authentication and authorization service that is based on a time-sensitive, ticket-granting system.

A

Kerberos

36
Q

A component of Kerberos that authenticates users and issues tickets (tokens).

A

Key distribution center (KDC)

37
Q

In Kerberos, a token issued to an authenticated account to allow access to authorized application servers.

A

Ticket Granting Ticket (TGT)

38
Q

A process that provides a shared login capability across multiple systems and enterprises. It essentially connects the identity management services of multiple systems.

A

Federation

39
Q

In a federated network, the service that holds the user account and performs authentication.

A

Identity provider (IdP)

40
Q

An XML-based data format used to exchange authentication information between a client and a service.

A

Security Assertion Markup Language (SAML)

41
Q

An XML-based web services protocol that is used to exchange messages.

A

Simple Object Access Protocol (SOAP)

42
Q

A standardized, stateless architectural style used by web applications for communication and integration.

A

Representational State Transfer (REST)

43
Q

A standard for federated identity management, allowing resource servers or consumer sites to work with user accounts created and managed on a separate identity provider.

A

Open Authorization (OAuth)

44
Q

A file format that uses attribute-value pairs to define configurations in a structure that is easy for both humans and machines to read and consume.

A

JavaScript Object Notation (JSON)

45
Q

An authentication mechanism that allows a user to perform a biometric scan to operate an entry or access system. Physical characteristics stored as a digital data template can be used to authenticate a user. Typical features used include facial pattern, iris, retina, fingerprint pattern, and signature recognition.

A

Biometric authentication

46
Q

A biometric assessment metric that measures the number of valid subjects who are denied access.

A

False Rejection Rate (FRR)

47
Q

A biometric assessment metric that measures the number of unauthorized users who are mistakenly allowed access.

A

False Acceptance Rate (FAR)

48
Q

A biometric evaluation factor expressing the point at which FAR and FRR meet, with a low value indicating better performance.

A

Crossover Error Rate (CER)

48
Q

Granting a user on the computer system the right to use a resource.

A

Authorization

49
Q

A collection of access control entries that determines which users are allowed or denied access to an object and the privileges given to that user.

A

Access control list (ACL)

50
Q

Access rights are cumulative, giving the user combined permissions from multiple groups.

A

Effective permissions

51
Q

Always override Allow permissions.

A

Deny permissions

52
Q

A domain is an administratively defined collection of network resources that share a common directory database and security policies. The domain is the basic administrative unit of an Active Directory structure.

A

Domain

53
Q

A tree is a group of related domains that share the same contiguous DNS namespace.

A

Tree

54
Q

A forest is a collection of related domain trees. The forest establishes the relationship between trees that have different DNS namespaces.

A

Forest

55
Q

An organizational unit is similar to a folder. It subdivides and organizes network resources within a domain.

A

Organizational unit (OU)

56
Q

Each resource within Active Directory is identified as an object.

A

Object

57
Q

A domain controller is a server that holds a copy of the Active Directory database. It is also the copy of the Active Directory database on a domain controller that can be written to.

A

Domain controller

58
Q

Replication is the process of copying changes to Active Directory on the domain controllers.

A

Replication

59
Q

Member servers are servers in the domain that do not have the Active Directory database.

A

Member servers

60
Q

A policy is a set of configuration settings applied to users or computers.

A

Policy

61
Q

The process of accessing a smart card’s chip surface directly to observe, manipulate, and interfere with the circuit.

A

Microprobing

62
Q

The wireless, non-contact use of radio frequency waves to transfer data.

A

Radio frequency identification (RFID)

63
Q

AAA protocol used to manage remote and wireless authentication infrastructures.

A

Remote Authentication Dial-in User Service (RADIUS)

64
Q

a network security protocol that provides centralized authentication, authorization, and accounting (AAA) services for users attempting to access network resources.

A

Terminal Access Controller Access-Control System Plus (TACACS+)