4.0 Identity and Access Management Flashcards

1
Q

An authentication factor using biometrics, such as fingerprint scanner.

A

Something You Are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An authentication factor using something physical, such as smart card or token.

A

Something You Have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An authentication factor indicating knowledge, such as password or pin.

A

Something You Know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An authentication factor indicating location, often using geolocation technologies.

A

Somewhere You Are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An authentication factor indicating an action, such as gestures or on a touch screen.

A

Something You Do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A collection of computer networks that agree on standards of operation, such as security standards.

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication method where users can access multiple resources on a network using a single account.

A

SSO (Single Sign On)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An indirect trust relationship created by two or more direct trust relationships.

A

Transitive Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process that occurs when a user proves an identity, such as with a password.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of granting access to resources for user who prove their identity, such as a username and password based on their proven identity.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of tracking the activity of users and recording this activity in logs. One method is auditing logs that create an audit trail.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An authentication protocol developed at MIT that uses tickets for authentication.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An authentication service that provides central authentication for remote access clients. It can be used as an alternative for RADIUS.

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An older authentication protocol where passwords or pins are sent across a network in clear text.

A

PAP (Password Authentication Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Microsoft Implementation of CHAP

A

MSCHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A protocol that is used in distributed directory service networks, such as active directory, to assist hosts in locating network resources. This replaced the older x.500 Directory service protocol and uses TCP port 389.

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AAA Standard created to support ISPs with hundreds if not thousands of modems in hundreds of computers to connects to a single central database.

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A format for a client and server to exchange authentication and authorization data securely. It defines three roles for making this happen: Principle, identity provider, and service provider.

A

SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An open source standard used for identification on the internet. It is typically used with OAuth and it allows clients to verify the identity of end users without managing their credentials.

A

OpenID Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An open source standard used for authorization with internet-based single sign-on solutions.

A

OAUTH

21
Q

an open source federated identity solution.

A

Shibboleth

22
Q

A suite of protocols that provide confidentiality, integrity, and authentication within Windows systems.

Versions: NTLM, NTLM v2, NTLM2

A

NTLM (New Technology LAN Manager)

23
Q

Access control that uses sensitivity label assigned to objects (files and folders) and subjects (users)

A

MAC (Mandatory Access Control)

24
Q

Access control model where all objects have owners and owners can modify permissions for the objects (files and folders)

Microsoft NTFS uses this model.

A

DAC (Discretionary Access Control)

25
Q

Access control model that grants access to resources based on attributes assigned to subjects and objects.

A

ABAC (attribute-based access control)

26
Q

Access control model that uses roles based on jobs and functions to define access. It is often implemented with groups (providing group-based privileges.)

A

Role-Based AC

27
Q

Access control model that uses rules to define access. This is based on a set of approved instruction , such as an ACL, or rules that trigger in response to an event, such as modifying ACLs after detecting an attack.

A

Rule-Based AC

28
Q

Small credit card sized cards that activate when they are in close proximity of the card reader. They are often authorized personnel to open doors.

A

Proximity Card

29
Q

A credit card sized card that has an embedded microchip and certificate. It is used for authentication in something you have factor of authentication.

A

Smart Card

30
Q

A rate that identifies the percentage of times biometric authentication system incorrectly indicates a match.

A

FAR (False Acceptance Rate)

31
Q

A rate that identifies the percentage of times biometric authentication system incorrectly rejects a valid match.

A

FRR (False Rejection Rate)

32
Q

The point where the FRR and the FAR cross over. The lower CER the more accurate the biometric system.

A

CER (Crossover Error Rate)

33
Q

An open standard used for creating one-time passwords. It combines a secret key and a counter, then uses HMAC to create a hash of the result.

A

HOTP (HMAC based One Time Password)

34
Q

AN open source standard similar to HOTP. It uses timestamps instead of a counter. One-time passwords created with this expire after 30 Seconds.

A

TOTP (Time-Based One-Time Password)

35
Q

An authentication protocol used in VPNs and wires and wireless networks. VPNs often implement it as a RADIUS server. Wired networks use it for port-based authentication. Wireless networks use it in Enterprise Mode. It can be used with certificate-based authentication.

A

IEEE 802.1x

36
Q

A logically created system identifier that binds to a particular individual and is used to tie to a particular action or allowed actions.

A

User Account

37
Q

A pre-created account in Windows system. It is disabled by default.

A

Guest Account

38
Q

An account with elevated privileges, such as an administrator account.

A

Privileged Account

39
Q

A security principle that specifies that individuals and processes are granted only the rights and permissions needs to perform the assigned attacks or functions, and no more.

A

Least Privilege

40
Q

The process of granting individuals access to organization’s computing resources after being hired. It typically includes giving the employee a user account with appropriate permissions.

A

Onboarding

41
Q

The process of orderly separating an employee from the organization, including termination letter, exit interview, return of all company equipment, and transfer of knowledge for subsequent hires.

A

Offboarding

42
Q

An audit that analyzes user privilege’s. It identifies the privilege’s (rights and permissions) granted to users, and compares them against what the users need.

A

Permission Audit Review

43
Q

The practice of recording events and analyzing them to detect negative events and determine patterns or trends. It is usually performed through examination of manual and automatic logs.

A

Audit

44
Q

An account restriction that prevents users from logging on at certain times.

A

Time-of-Day Restriction

45
Q

A role based access control method that uses groups as roles.

A

Group-based AC

46
Q

Policies that prevent users from logging on from certain locations, or require that they log on only from specific locations.

A

Location Based Policy

47
Q

A feature of Windows Active Directory that allows an administrator to apply policy settings to entire groups of computers and users within the domain. Generically, in a non-windows context, it refers to a policy of managing users in a defined logical group, by functional, geographical, or security requirements.

A

Group Policy

48
Q

A policy that identifies when administrators should disable user accounts.

A

Disablement Policy