8: Identity and Access Management Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does AAA stand for in security concepts?

A

Authentication, Authorization, and Accounting

AAA is a framework for controlling access to computer resources, enforcing policies, and auditing usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of mitigation techniques in security?

A

To secure the enterprise

Mitigation techniques help reduce vulnerabilities and protect against potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Access Control List (ACL)?

A

A list that defines permissions for users and groups regarding resources

ACLs specify which users or systems have access to specific resources and what actions they can perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is provisioning in the context of identity management?

A

The process of creating user accounts and granting access rights

Provisioning ensures that users have the necessary access to perform their job functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does identity proofing entail?

A

Verifying the identity of a user before granting access

Identity proofing is crucial for ensuring that the user is who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Single Sign-On (SSO)?

A

A user authentication process that allows a user to access multiple applications with one set of login credentials

SSO improves user experience and reduces password fatigue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the factors involved in multifactor authentication?

A
  • Something you know
  • Something you have
  • Something you are
  • Somewhere you are

Multifactor authentication enhances security by requiring multiple forms of verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the types of access controls?

A
  • Mandatory
  • Discretionary
  • Role-based
  • Rule-based
  • Attribute-based
  • Time-of-day restrictions
  • Least privilege

Different models of access control can be applied based on organizational needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the significance of privileged access management tools?

A

They ensure proper controls and monitoring for superusers and privileged accounts

Tools like just-in-time permissions and password vaulting help manage high-level access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are password best practices?

A
  • Length
  • Complexity
  • Reuse
  • Expiration
  • Age

Following these practices can significantly enhance password security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the concept of interoperability in identity management?

A

The ability of different authentication and authorization services to work together

Interoperability ensures seamless access across systems and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: Identities are one of the most important _______ in modern organizations.

A

security layers

Managing identities effectively is critical for organizational security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of accounting in AAA?

A

Tracking user actions and resource usage

Accounting provides a record of who accessed what resources and when.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the term ‘authentication’ refer to?

A

The process of verifying the identity of a user or system

Authentication ensures that users are who they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of implementing identity and access management?

A

To control access to systems and services, and manage user rights

Effective identity and access management is vital for organizational security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are identities?

A

Sets of claims made about a subject

Subjects can include people, applications, devices, systems, or organizations, with the most common application being individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of information is typically linked to identities?

A

Attributes or information about the subject

This includes details important for the use of their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the difference between attributes and traits?

A

Attributes are changeable; traits are inherent

Examples: attributes can include title or address; traits include height or eye color.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the most commonly used means of claiming an identity?

A

Usernames

Usernames are associated with an identity but are not authentication factors themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are certificates in the context of identity?

A

Stored on a system or paired with a device to identify systems or individuals

Certificates can be used for both devices and individual identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are tokens?

A

Physical devices that present a certificate or information

Tokens may generate a code or connect via USB/Bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are SSH keys?

A

Cryptographic representations of identity replacing a username and password

SSH keys enhance security by eliminating the need for traditional credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What do smartcards use for identity verification?

A

An embedded chip

Smartcards can be contactless or require a physical chip reader and often generate key pairs on the card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a common issue with key pairs?

A

Exposed or lost key pairs can create security hassles

Common problems include uploading private keys to public repositories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a common poor practice related to key pairs?

A

Poor passphrase management or using a blank passphrase

This is particularly concerning for SSH keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How do cloud service providers handle key pair security?

A

They monitor for uploads to third-party services and subsequent exploits

Training developers and administrators on proper handling is crucial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is critical for the security of smartcards?

A

The security of the card and its key generation/storage

Well-designed smartcards generate key pairs on the card to prevent unauthorized copies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the purpose of authentication?

A

To prove that a subject’s identity is theirs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does authorization verify?

A

What you have access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the two main functions of authentication and authorization combined?

A
  • Verify who you are
  • Allow access to resources based on authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does SSO stand for?

A

Single Sign-On

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

List three authentication protocols mentioned in the text.

A
  • EAP
  • CHAP
  • RADIUS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the Extensible Authentication Protocol (EAP) commonly used for?

A

Wireless network authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the Challenge Handshake Authentication Protocol (CHAP) designed to provide?

A

More security than earlier protocols like PAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What standard does 802.1X represent?

A

Network access control (NAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is RADIUS used for?

A

Authentication, authorization, and accounting (AAA) for network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

True or False: RADIUS operates in a client-server model.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What does TACACS+ provide in addition to authentication?

A

Authorization and accounting services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are the three main elements of Kerberos users?

A
  • Primary
  • Instance
  • Realms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Fill in the blank: Single sign-on systems allow a user to log in with a single identity and then use multiple systems or services without _______.

A

reauthenticating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the Lightweight Directory Access Protocol (LDAP) commonly used for?

A

Identity management infrastructure and organizational directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the Security Assertion Markup Language (SAML)?

A

An XML-based open standard for exchanging authentication and authorization information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is OpenID used for?

A

Decentralized authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does OAuth allow users to do?

A

Determine what information to provide to third-party applications without sharing credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the role of an identity provider (IdP) in federated identity deployments?

A

Manage the life cycle of digital identities and provide authentication services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is attestation?

A

A formal verification that something is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is a relying party (RP)?

A

A party that requires authentication and identity claims from an IdP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is interoperability in the context of identity management?

A

The ability to connect different organizations together using standards-based technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

List two technologies used for federated authentication.

A
  • OpenID Connect
  • SAML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is a common use case for cloud service providers regarding identity management?

A

Support some form of identity federation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the purpose of authentication?

A

To prove that a subject’s identity is theirs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What does authorization verify?

A

What you have access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What are the two main functions of authentication and authorization combined?

A
  • Verify who you are
  • Allow access to resources based on authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What does SSO stand for?

A

Single Sign-On

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

List three authentication protocols mentioned in the text.

A
  • EAP
  • CHAP
  • RADIUS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the Extensible Authentication Protocol (EAP) commonly used for?

A

Wireless network authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the Challenge Handshake Authentication Protocol (CHAP) designed to provide?

A

More security than earlier protocols like PAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What standard does 802.1X represent?

A

Network access control (NAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is RADIUS used for?

A

Authentication, authorization, and accounting (AAA) for network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

True or False: RADIUS operates in a client-server model.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What does TACACS+ provide in addition to authentication?

A

Authorization and accounting services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are the three main elements of Kerberos users?

A
  • Primary
  • Instance
  • Realms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Fill in the blank: Single sign-on systems allow a user to log in with a single identity and then use multiple systems or services without _______.

A

reauthenticating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the Lightweight Directory Access Protocol (LDAP) commonly used for?

A

Identity management infrastructure and organizational directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is the Security Assertion Markup Language (SAML)?

A

An XML-based open standard for exchanging authentication and authorization information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is OpenID used for?

A

Decentralized authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What does OAuth allow users to do?

A

Determine what information to provide to third-party applications without sharing credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the role of an identity provider (IdP) in federated identity deployments?

A

Manage the life cycle of digital identities and provide authentication services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is attestation?

A

A formal verification that something is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is a relying party (RP)?

A

A party that requires authentication and identity claims from an IdP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is interoperability in the context of identity management?

A

The ability to connect different organizations together using standards-based technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

List two technologies used for federated authentication.

A
  • OpenID Connect
  • SAML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is a common use case for cloud service providers regarding identity management?

A

Support some form of identity federation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is the core of the authentication process?

A

Proving that the claimed identity belongs to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is the most common means of authentication?

A

Using a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What are two major flaws of passwords?

A
  • Can be stolen and used by third parties
  • Susceptible to brute-force attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is multifactor authentication (MFA)?

A

A security process that requires multiple forms of verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What are the password best practices recommended by NIST?

A
  • Use Show Password to prevent typos
  • Use password managers
  • Store secrets securely using salting and secure hashing
  • Lock accounts after multiple attempts
  • Employ multifactor authentication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Fill in the blank: Passwords should be stored securely using _______.

A

salting and secure hashing methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What does NIST recommend regarding password complexity?

A

Reduce complexity requirements and emphasize length.

82
Q

What is one of the primary benefits of using a password manager?

A

Reduction in password reuse.

83
Q

What happens when a password manager is breached?

A

User secrets, such as master passwords and MFA seeds, may be exposed.

84
Q

What is passwordless authentication?

A

Authentication relying on something you have or are, rather than a password.

85
Q

What are some factors that can be used in passwordless authentication?

A
  • Security tokens
  • One-time password applications
  • Biometric factors.
86
Q

True or False: Multifactor authentication can help reduce risks associated with compromised passwords.

87
Q

What are the four factors defined by the Security+ exam outline for MFA?

A
  • Something you know
  • Something you have
  • Something you are
  • Somewhere you are.
88
Q

What is a one-time password (OTP)?

A

A password that is usable only once.

89
Q

What are the two primary models for generating one-time passwords?

A
  • Time-based one-time passwords (TOTP)
  • HMAC-based one-time passwords (HOTP).
90
Q

How can TOTP passwords be generated?

A

Using an algorithm that derives a one-time password based on the current time.

91
Q

What is a common attack against one-time passwords?

A

Tricking users into providing their OTP.

92
Q

What does the acronym HMAC stand for?

A

Hash-based Message Authentication Codes.

93
Q

What are some common biometric technologies?

A
  • Fingerprints
  • Retina scans
  • Voice prints.
94
Q

Fill in the blank: The FIDO2 standard supports both the W3C Web Authentication specification and the _______.

A

Client to Authenticator Protocol (CTAP).

95
Q

What are the risks associated with using SMS for OTP?

A

Can be redirected using a cloned SIM or compromised VoIP systems.

96
Q

What is the purpose of password expiration dates?

A

To ensure passwords are not used for extended periods of time.

97
Q

True or False: Password managers are only available as third-party applications.

98
Q

What are static codes in the context of one-time passwords?

A

Pre-generated codes that do not require a device or connectivity.

99
Q

What are biometric factors?

A

They rely on the unique physiology of the user to validate their identity.

Examples include voice prints and gait.

100
Q

Name three common biometric technologies.

A
  • Fingerprints
  • Retina scanning
  • Iris recognition
101
Q

What is the purpose of fingerprint scanning?

A

To check the unique patterns of ridges and valleys on fingertips using scanners.

Used in devices like Windows laptops and mobile devices.

102
Q

How does retina scanning identify users?

A

It uses the unique patterns of blood vessels in the retina.

This method is distinct from iris recognition.

103
Q

What is the difference between iris recognition and retina scanning?

A

Iris recognition uses pattern recognition and infrared imaging, while retina scanning uses blood vessel patterns.

Iris recognition can be performed from a greater distance.

104
Q

What technology is used for facial recognition?

A

It matches specific features to an original image in a database.

Widely used in Apple iPhone for Face ID.

105
Q

Describe voice recognition systems.

A

They rely on patterns, rhythms, and sounds of a user’s voice to recognize the user.

106
Q

What is vein recognition?

A

It uses scanners to see the pattern of veins in a user’s finger or arm.

Unlike fingerprint scanners, vein scanners do not require contact.

107
Q

What does gait analysis measure?

A

It measures how a person walks to identify them.

108
Q

Define Type I errors in biometric systems.

A

False rejection rate (FRR), where a legitimate biometric measure is presented but rejected.

109
Q

What are Type II errors in biometric systems?

A

False acceptance errors, measured as the false acceptance rate (FAR), where an unauthorized biometric factor is accepted.

110
Q

What does the receiver operating characteristic (ROC) compare?

A

It compares the FRR against the FAR of a system.

111
Q

What is the FIDO Alliance’s FRR threshold for certification?

A

3 percent of attempts for FRR and .01 percent for FAR for their basic BioLevel1 requirement.

112
Q

What is the Imposter Attack Presentation Match Rate (IAPMR)?

A

It measures how often an attack will succeed against a biometric system.

113
Q

Why did retina scanners fail to gain popularity?

A

Most people do not want to bend over and peer into a retina scanner.

114
Q

What challenges have early fingerprint scanners faced?

A

They struggled to scan many fingerprints, especially from users with worn fingerprints.

This can be due to manual labor or chemical exposure.

115
Q

What is a consideration when deploying biometric systems?

A

User acceptance must be assessed, and backup methods should be available for some users.

116
Q

True or False: Biometric systems are always easy to deploy.

117
Q

What shows the successful implementation of biometric factors?

A

The broad usage of Apple’s Face ID and Touch ID, along with Android’s fingerprint readers.

118
Q

What is required to claim an identity and access a system or service?

A

An account

Accounts contain information about a user, including rights and permissions.

119
Q

What are the basic account types?

A
  • User accounts
  • Privileged or administrative accounts
  • Shared and generic accounts
  • Guest accounts
  • Service accounts

These account types vary in their permissions and intended use.

120
Q

What is a user account?

A

An account that ranges from basic access to systems to power users with broad rights

Example: Windows Standard User account.

121
Q

What defines privileged or administrative accounts?

A

Accounts like the root account on Linux, Unix systems, and the Windows Administrator account

These accounts have elevated permissions.

122
Q

What are shared and generic accounts?

A

Accounts often prohibited by security policies, useful but problematic for tracking actions

Organizations may use delegation to avoid shared account issues.

123
Q

What are guest accounts?

A

Accounts for temporary users with limited privileges and minimal user information

They typically have very restricted access.

124
Q

What are service accounts?

A

Accounts associated with applications and services, not for interactive logins

Organizations enforce security policies for service accounts.

125
Q

What are the two most important phases in the user account life cycle?

A
  • Provisioning (creation)
  • Deprovisioning (termination)

These phases are critical for account management.

126
Q

What occurs during account provisioning?

A

Creation of the account and setting of resources, permissions, and attributes

May involve identity proofing.

127
Q

What is identity proofing?

A

The process of verifying the identity of the person claiming the account

Commonly involves government IDs and personal information.

128
Q

What is the concept of least privilege?

A

The practice of granting users only the minimum permissions necessary for their roles

A key aspect of permission management.

129
Q

What is permission creep?

A

The accumulation of excessive permissions by users over time

Often occurs when users take on new roles without proper permission review.

130
Q

What is the preferred method of account termination?

A

Complete removal of the account

This reduces the risk of dormant accounts being compromised.

131
Q

What is privileged access management (PAM)?

A

Tools used to manage administrative and privileged accounts

Focus on maintaining least privilege and providing granular controls.

132
Q

What are just-in-time (JIT) permissions?

A

Permissions granted and revoked only when needed

Helps prevent ongoing access when not necessary.

133
Q

What is password vaulting?

A

A method to access privileged accounts without knowing the password

Allows for logged, auditable events related to credential use.

134
Q

What are ephemeral accounts?

A

Temporary accounts with limited lifespans

Used for specific purposes or guests, requiring proper deprovisioning.

135
Q

What is the purpose of access control schemes?

A

To determine which users, services, and programs can access various files or other objects.

136
Q

What does Mandatory Access Control (MAC) rely on?

A

The operating system to enforce control as set by a security policy administrator.

137
Q

True or False: In a MAC implementation, users can change the security policies set centrally.

138
Q

Where are MAC implementations commonly found?

A

In high-security systems like SELinux and Windows as Mandatory Integrity Control (MIC).

139
Q

What is Discretionary Access Control (DAC)?

A

An access control scheme that allows owners to delegate rights and permissions to objects.

140
Q

Fill in the blank: The owner of a file in DAC can set permissions for the ______, group, or world.

141
Q

What is the main principle behind Role-Based Access Control (RBAC)?

A

Roles are matched with privileges assigned to those roles.

142
Q

List the three primary rules of RBAC.

A
  • Role assignment
  • Role authorization
  • Permission authorization
143
Q

True or False: RBAC systems allow subjects to have multiple roles.

144
Q

What is Rule-Based Access Control (RuBAC)?

A

An access control method applied using a set of rules or access control lists (ACLs).

145
Q

What is an example of Rule-Based Access Control?

A

A firewall ruleset.

146
Q

What does Attribute-Based Access Control (ABAC) rely on?

A

Policies driven by attributes of the users.

147
Q

What is a key advantage of ABAC systems?

A

Flexibility due to complex rulesets based on combinations of attributes.

148
Q

What is a downside of ABAC policies?

A

They can be complex to manage well.

149
Q

What do time-of-day restrictions limit?

A

When activities can occur.

150
Q

Fill in the blank: The concept of _______ states that accounts should only be given the minimum permissions necessary.

A

[least privilege]

151
Q

What do filesystem controls determine?

A

Which accounts, users, groups, or services can perform actions like reading, writing, and executing files.

152
Q

What does the Linux permission string ‘drwxrwxrwx’ indicate?

A

It shows the type of file and user, group, and world permissions.

153
Q

How can Windows file permissions be set?

A

Using the command line or the GUI.

154
Q

What does the ‘Modify’ permission in Windows allow?

A

Viewing as well as changing files or folders.

155
Q

What is a common attack that exploits weak filesystem permissions?

A

Directory traversal attacks.

156
Q

What is the purpose of access control schemes?

A

To determine which users, services, and programs can access various files or other objects.

157
Q

What does Mandatory Access Control (MAC) rely on?

A

The operating system to enforce control as set by a security policy administrator.

158
Q

True or False: In a MAC implementation, users can change the security policies set centrally.

159
Q

Where are MAC implementations commonly found?

A

In high-security systems like SELinux and Windows as Mandatory Integrity Control (MIC).

160
Q

What is Discretionary Access Control (DAC)?

A

An access control scheme that allows owners to delegate rights and permissions to objects.

161
Q

Fill in the blank: The owner of a file in DAC can set permissions for the ______, group, or world.

162
Q

What is the main principle behind Role-Based Access Control (RBAC)?

A

Roles are matched with privileges assigned to those roles.

163
Q

List the three primary rules of RBAC.

A
  • Role assignment
  • Role authorization
  • Permission authorization
164
Q

True or False: RBAC systems allow subjects to have multiple roles.

165
Q

What is Rule-Based Access Control (RuBAC)?

A

An access control method applied using a set of rules or access control lists (ACLs).

166
Q

What is an example of Rule-Based Access Control?

A

A firewall ruleset.

167
Q

What does Attribute-Based Access Control (ABAC) rely on?

A

Policies driven by attributes of the users.

168
Q

What is a key advantage of ABAC systems?

A

Flexibility due to complex rulesets based on combinations of attributes.

169
Q

What is a downside of ABAC policies?

A

They can be complex to manage well.

170
Q

What do time-of-day restrictions limit?

A

When activities can occur.

171
Q

Fill in the blank: The concept of _______ states that accounts should only be given the minimum permissions necessary.

A

[least privilege]

172
Q

What do filesystem controls determine?

A

Which accounts, users, groups, or services can perform actions like reading, writing, and executing files.

173
Q

What does the Linux permission string ‘drwxrwxrwx’ indicate?

A

It shows the type of file and user, group, and world permissions.

174
Q

How can Windows file permissions be set?

A

Using the command line or the GUI.

175
Q

What does the ‘Modify’ permission in Windows allow?

A

Viewing as well as changing files or folders.

176
Q

What is a common attack that exploits weak filesystem permissions?

A

Directory traversal attacks.

177
Q

What is identity and access management?

A

A key element in organizational security.

178
Q

What is authentication?

A

The process of proving your claim to an identity by providing one or more factors.

179
Q

What are the factors involved in authentication?

A

They include:
* Something you know
* Something you have
* Something you are
* Somewhere you are

180
Q

What does authorization provide to authenticated users?

A

Privileges and rights needed to accomplish their roles.

181
Q

What types of user accounts exist?

A

They range from:
* Guest users
* Normal users
* Service accounts
* Privileged administrative accounts

182
Q

What do account policies shape?

A

Details and requirements for each account, including when accounts should be locked out or disabled.

183
Q

Name some common authentication methods and technologies.

A

Examples include:
* RADIUS
* LDAP
* EAP
* CHAP
* OAuth
* OpenID
* SAML

184
Q

What is the purpose of single sign-on (SSO)?

A

Allows users to log in once and use their identities throughout many systems.

185
Q

What is federation in identity management?

A

Uses identity providers to authenticate users for various service providers without needing a distinct identity.

186
Q

What enables interoperability between identity and authorization systems?

A

Standards and shared protocols.

187
Q

What is attestation in the context of identity management?

A

Validation that a user or identity belongs to the user claiming it.

188
Q

How has multifactor authentication impacted password security?

A

It has limited problems such as password theft, reuse, and brute-force attacks.

189
Q

What is biometric authentication?

A

Uses physical traits such as fingerprint, retina print, or facial recognition.

190
Q

What is critical to know about biometric authentication?

A

How often it incorrectly allows the wrong person in or rejects a legitimate user.

191
Q

What types of authentication tokens are commonly used?

A

Both hardware- and software-based authentication tokens.

192
Q

What are hardware security keys?

A

Increasingly common authentication tokens.

193
Q

What do password vaults provide?

A

Cryptographically secured storage to keep passwords secure.

194
Q

What has changed regarding password best practices?

A

Focus has shifted to length as the primary control to avoid brute forcing.

195
Q

What is passwordless authentication?

A

Replacing passwords with secure tokens or applications.

196
Q

Name some access control schemes.

A

They include:
* Attribute-based access control
* Discretionary access control
* Mandatory access control
* Role-based access control

197
Q

What does privileged access management ensure?

A

That administrative users are well managed.

198
Q

What are just-in-time permissions?

A

A technique used in privileged access management systems.

199
Q

What are ephemeral accounts?

A

Temporary accounts used in privileged access management.

200
Q

Linux file permissions

A

A. Linux file permissions are read left to right, with the first three characters indicating read, write, and execute permissions (rwx) for the owner of the file, the second three apply to the group, and the last three to all other users. Any indicated with a – are not allowed for that set.

201
Q

Windows