Access Management Principles Flashcards
What are the three components of the AAA concept in cybersecurity?
Authorization, authentication, accounting.
When you arrive at the front desk of a secured building, you are required to verify your identification. What is the purpose of this requirement?
Authentication
You are visiting the Web portal of your bank. You use your username and password to access your account. And another prompt appears and asks you to enter the answer to a secret question. Which authentication factor is the bank using?
Something you know
Yes or no? “ answer to a secret question” belongs to the authentication factor of something you have.
No, because the answer to a secret question is something you know
Yes or no? “email token” belongs to the authentication factor of something you have.
Yes, because after you initiate the authentication, you will receive an email that contains the token.
Yes or no? “Fingerprint” belongs to the authentication factor of something you have
No because it is something you are
Yes or no? “key” belongs to the authentication factor of something you have.
Yes because a key is something you have
Yes or no? “retinal scan” belongs to the authentication factor of “something you have”
No because it is something you are
Yes or no? “ smart card” belongs to the authentication factor of “something you have”
Yes, because a smart card is something you have
______ is something you have because it is a password that is sent to you.
Sms token
________ is something you know, because a _______ is something that you have memorized.
Pin number
_________ is something you are because it is something that is unique to you.
Facial recognition
Your company has a VPN server. And a few routers that allow remote access by authorized employees, you are a network administrator and ready to implement the AAA framework for access control. Which server component should you install and configure to support a centralized AAA solution?
RADIUS server
You are reviewing window security logs and notice a series of suspicious failed login attempts against the administrator user. You believe these attempts might be from a brute force attack .Which password policy should you review and modify to protect the window system from this attack?
Limit the number of login retries
You are a network administrator at a company you are deploying a VPN solution to allow sales representatives to access the internal network while visiting partner stores. You need to be able to verify the identity of a person who makes the VPN connection. What should you do to modify the connection policy?
Require an OTP mobile application with user credentials. By using a one time password, the VPN user is verified through multiple methods.