Access Mgmt Flashcards
What is IAM?
ID Access Mgmt
IAM is sec & bus discipline that ?
“Enables right individual & sys to access right resources at right times for right reasons”
IAM could also support (3):
- Could include customers
- BYOD – securing non-Web Application program (API)
& using Corp ID is norm - Support Cloud base application w/ IAM
Who is responsible for granting access to a user in federated identity management?
A. Identity provider
B. Relying party
C. SaaS provider
D. User
B. Relying party
An organization requires that it federates its internal systems and their externally hosted SaaS finance system so a user does not have to re-authenticate. This is an example of which of the following?
A. Open authentication
B. Single sign-on
C. Biometric scanning
D. Multifactor authentication
B. Single sign-on
Who is the Relying Party in a federated environment, and what do they do?
A. The Customer. They consume tokens generated by
the Identity Provider.
B. The Service Provider. They consume tokens
generated by the customer.
C. The Identity Provider. They consume tokens
generated by the service provider.
D. The Service Provider. They consume tokens
generated by the Identity Provider.
D. The Service Provider. They consume tokens
generated by the Identity Provider.
What are 2 types of access keys?
Key pairs or x.509 certificates
Key pairs consist of (2) keys
Public
Private key
Private key is used for?
digital sign
Public key is used for?
validation of the signature
X.509 certificates contain
__________ + __________
Each certificate is associated with:
public key + metadata (ie: expiration dt)
Each certificate is associated with: PRIVATE KEY
What type of encryption over Internet is used?
(2) separate types
- TLS / SSL – both use x.509 certify, Asymmetric crypto & exchange symmetric key
- TDE Transparent Data Encrypt – encrypt DB files (MS/Oracle) key based AC sys
Which of the following is BEST used when setting up security for services being used within a public cloud?
A. LDAP
B. SFTP
C. SNMP
D. SSL
D. SSL
What is Transparent Encryption?
In transparent encryption, the encryption engine resides in the database and is transparent to the application.
What is File Level Encryption?
Encryption engine and keys reside on the INSTANCES. The database folder or volume is encrypted, and encryption engine and keys reside on instances attached to volume. It protects against lost backup, external attacks and media theft.