8. Identity and Access Management Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the foundations of authentication and authorization?

A

Identities

Identities are claimed through an authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What methods can users use to claim an identity?

A

Usernames, certificates, tokens, SSH keys, smartcards

Each method provides additional security capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What attributes are used to describe a user’s identity?

A

Job, title, personal traits

Attributes are stored as part of the user’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is single sign-on (SSO)?

A

Allows users to log in once and access resources across an organization

SSO is a core element of many identity infrastructures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are critical technologies for modern SSO designs?

A

LDAP, OAuth, SAML

These technologies are widely used in SSO implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are best practices for password configuration?

A

Length, complexity, reuse, expiration, age

Understanding each setting is important for security professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What role do password managers play in security?

A

Limit password reuse, manage passwords for organizations

They are effective when implemented with enterprise solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does multifactor authentication rely on?

A

Additional factors beyond passwords

Potential factors include biometrics and hardware/software tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the distinct factors in multifactor authentication?

A

Something you know, something you have, something you are, somewhere you are

Each factor provides a different layer of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the types of user accounts?

A

Users, guests, administrative (privileged), service accounts

Understanding account types is crucial for managing access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is privileged access management (PAM)?

A

Focuses on controlling privileged accounts and rights

Techniques include just-in-time permission granting and ephemeral accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do access control schemes determine?

A

What rights accounts have

Access control schemes are essential for managing user permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is attribute-based access control (ABAC)?

A

Employs user attributes to determine access

ABAC is one of the key access control schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is role-based access control (RBAC)?

A

Makes decisions based on roles

RBAC is commonly used for managing user permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is rule-based access control?

A

Uses rules to control access

Sometimes referred to as a variant of RBAC.

17
Q

What is mandatory access control (MAC)?

A

Relies on the system administrator to control access

MAC is stricter compared to discretionary access control.

18
Q

What is discretionary access control (DAC)?

A

Allows users to make decisions about access to files and directories

DAC provides more flexibility to users.

19
Q

What is the focus of privileged access management (PAM)?

A

Controlling administrative accounts

PAM helps in managing permissions for sensitive operations.

20
Q

What do test takers need to know about filesystem permissions?

A

How to use and apply common filesystem permissions

Understanding permissions is critical for security management.