authentication and authorization solutions Flashcards

1
Q

What type of attacks do Kerberos authentication protect against?

A

Replay attacks and Man-in-the-Middle Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____ is a secure cryptoprocessor enclave implemented on a PC, laptop, smartphone, or network appliance. It is commonly used to store the keys to unlock an encrypted hard drive or solid-state drive.

A

trusted platform module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is specifically designed for network administration of routers. ______ data packets are encrypted and make it easier for network admins to work with multiple routers simultaneously

A

Terminal Access Controller Access-Control System Plus (TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ provides authorization services only, while _____ provides federated authentication.

A

OAuth; OpenID Connect (OIDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ is the ideal choice for assigning complex rule-based privileges. _____ makes access decisions based on subject and object attributes, as well as context-dependent and system-wide attributes, making it the most fine-tuned control.

A

Attribute-Based Access Control (ABAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ is based on the primacy of the resource owner. The owner is granted full control and can modify its access control list (ACL) to grant rights to others.

A

Discretionary access control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

______ is based on the idea of security clearance levels. This is ideal for a “need to know” classification. Each object in this control system is labeled with a clearance level, and a user must possess the requisite clearance to access objects in this system.

A

Mandatory access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ authorizations or tokens are written and signed with the eXtensible Markup Language (XML) signature specification; this digital signature allows the service provider to trust the identity provider.

A

Security Association Markup Language (SAML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly