Access Mgmt Flashcards

1
Q

What is IAM?

A

ID Access Mgmt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAM is sec & bus discipline that ?

A

“Enables right individual & sys to access right resources at right times for right reasons”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM could also support (3):

A
  1. Could include customers
  2. BYOD – securing non-Web Application program (API)
    & using Corp ID is norm
  3. Support Cloud base application w/ IAM
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is responsible for granting access to a user in federated identity management?

A. Identity provider
B. Relying party
C. SaaS provider
D. User

A

B. Relying party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization requires that it federates its internal systems and their externally hosted SaaS finance system so a user does not have to re-authenticate. This is an example of which of the following?

A. Open authentication
B. Single sign-on
C. Biometric scanning
D. Multifactor authentication

A

B. Single sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who is the Relying Party in a federated environment, and what do they do?
A. The Customer. They consume tokens generated by
the Identity Provider.
B. The Service Provider. They consume tokens
generated by the customer.
C. The Identity Provider. They consume tokens
generated by the service provider.
D. The Service Provider. They consume tokens
generated by the Identity Provider.

A

D. The Service Provider. They consume tokens

generated by the Identity Provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 2 types of access keys?

A

Key pairs or x.509 certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key pairs consist of (2) keys

A

Public

Private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Private key is used for?

A

digital sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public key is used for?

A

validation of the signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

X.509 certificates contain
__________ + __________

Each certificate is associated with:

A

public key + metadata (ie: expiration dt)

Each certificate is associated with: PRIVATE KEY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of encryption over Internet is used?

(2) separate types

A
  1. TLS / SSL – both use x.509 certify, Asymmetric crypto & exchange symmetric key
  2. TDE Transparent Data Encrypt – encrypt DB files (MS/Oracle) key based AC sys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is BEST used when setting up security for services being used within a public cloud?

A. LDAP
B. SFTP
C. SNMP
D. SSL

A

D. SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Transparent Encryption?

A

In transparent encryption, the encryption engine resides in the database and is transparent to the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is File Level Encryption?

A

Encryption engine and keys reside on the INSTANCES. The database folder or volume is encrypted, and encryption engine and keys reside on instances attached to volume. It protects against lost backup, external attacks and media theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Application Level Encryption?

A

Encryption engine resides at the application using the database.

*It protects against a wide array of threats that include application-level attacks, compromised database and administrative accounts.

17
Q
Where does the encryption engine reside when using transparent encryption of database?
A. In Key Management System
B. Within the database
C. On instance(s) attached to the volume
D. At the database-using application
A

B. Within the database

18
Q

Safe Disposal of Electronic Records?

What is Degaussing?

A

Degaussing: The use of strong magnets to scramble data on magnetic tapes and hard drives

19
Q

Safe Disposal of Electronic Records?

What is Physical Destruction?

A

Physical Destruction: Physically shredding or incinerating the records to destroy them completely

20
Q

Safe Disposal of Electronic Records?

What is Overwriting?

A

Overwriting: Writing unimportant or random data over the real data to make the real data unreadable. More overwrites ensure better destruction of data. 1s & 0s

21
Q

Safe Disposal of Electronic Records?

What is Encryption?

A

Encryption: Rewriting the data in encrypted format so that it cannot be read without an encryption key.

22
Q

*Only suitable way to dispose data in CLOUD …

A
  1. Encryption.
  2. Encrypting data for disposal is called
    Crypto- shredding or digital shredding. *Keys req’d to
    read the data are deliberately destroyed.
23
Q

How does Cloud destroy data?

A

Crypto Shredding

24
Q

What is Crypto Shredding?

A

Encrypting data for disposal is called Crypto-shredding or digital shredding. *Keys required to read the data are deliberately destroyed.

25
Q

What is Federated Identity?

A

Common ID Std for Fed employees/Ctrs for users seeking physical access to Fed Cntl Govt Facilities and electronic access to Govt equipment and networks

26
Q

Federated Identity – (3) Standards?

A
  1. SAML Standard *SSO *Smart Client
  2. Open ID Standard *SSO
  3. Info Cards *Smart Client
27
Q

What are the differences between the (3) FED ID standards:
1. SAML Standard *SSO *Smart Client
Open std for ____ ______ / ______ data btw parties w/ ___.

  1. Open ID Standard *SSO
    ___ party allows users to authenticate using coop sites known as ___ _____.
  2. Info Cards *Smart Client
    Personal digital ID used mainly on ___ ___ or ___ party authentication
A
  1. SAML Standard *SSO *Smart Client
    > Exchg Authentication/Authorization
    > IdP
    Open std for exchange authentication / authorization data btw parties w/ IdP. In Public Cloud … user establishes Public key certificate w/ svc, Private key used to sign SOAP request.
  2. (3rd party) Allows users to be authenticated by certain
    > 3rd
    > RP Relying Parties
    co-op sites, known as (RP) Relying Parties
    ID provider provides the OPENID authentication, Exchange is enabled by browser used to communicate w/ RP / OPEN ID Provider
  3. Are personal digital identities that people can use
    > Mobil ID, 3rd
    online. Does not require card reader, ie: mobile ID & 3rd party authentication
    (3) users: IdP, RP, and Self
28
Q

Which of the following early examples of cloud computing was used for software engineering purposes in the form of web-based applications and required interoperability between different systems?

A. Distributed Computing
B. Service-Oriented Architecture (SOA)
C. Virtual Private Networks (VPNs)
D. Desktop Virtualization

A

B. Service-Oriented Architecture (SOA)

29
Q

Which of the following is a negative business impact of cloud computing?

A. It lowers the company’s overall application processing availability.
B. It is difficult to implement problem management.
C. It is more difficult to ensure policy compliance.
D. It slows down the company’s ability to deal with server capacity issues.

A

C. It is more difficult to ensure policy compliance.

30
Q

A specific cloud deployment has been established specifically for financial services companies to consume.
Which of the following BEST describes this type of cloud environment?

A. Private cloud
B. Community cloud
C. Hybrid cloud
D. Public cloud

A

B. Community cloud

31
Q

Least Privilege consists of (3) benefits?

A

Better svc (2)

 1. Stability
 2. Security 3. Ease of Deployment (saves steps)
32
Q

What are the benefits of Least Privilege Access?
A. Better service stability, security, & ease of
Deployment
B. Better service stability, lower complexity, better
security, & ease of Deployment
C. Improved availability, lower risk, lower cost of
development, and deployment
D. It is mainly about the best service availability

A

A. Better service stability, security, & ease of

Deployment

33
Q

How does the Role-Based Access Sec Grp work in the Cloud?

Security Grp acts as Virtual ____, Controls traffic on one/more ______, ______, _____ hosted in cloud.

A

SECURITY GROUP acts as
FW
services, instances, applications

Virtual FW & controls traffic of one/more services, instances, applications hosted in cloud
Like AD GPO

34
Q

What does the Security Group use to collect :
______ Accts
______ Accts
Other _____ Accts into manageable units

A

User accts
System accts
Other Grp accts into manageable units.

35
Q

How is the Security Group used?

When you launch ____, ____, ____, you associate one/more ____ _____s with _______. Like AD GPO.

A

When launch instance, container, application, you associated one/more Sec Groups with service.
*Like AD GPO

instance, container, application
Security Groups (with) service.