best practices Flashcards

1
Q

this principle states that users or groups are given only the access they need to do their job

A

principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this is when users or groups are not specifically given access to a resources and denied access

A

implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

this is when users or groups are specifically given access to a resources and denied access

A

explicit allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this is when users or groups are not allowed access to a resources and denied access

A

explicitly deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this describes the restriction of data that is highly sensitive and is usually referenced in government and military context

A

need to know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this is having more than one person required to complete a task

A

separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this is when users are crossed trained in multiple job positions and where responsibilities are regularly rotated between personnel

A

job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this access control method implements multiple access control methods instead of relying o a single method

A

defense-in-depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this occurs when a users job position changes and they are granted a new set of access privileges and their pervious access privileges are not removed or modified

A

creeping privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this stores a users authentication credential for multiple systems

A

credential management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in a windows network, these policies allow you to create password policies for users and global groups separate from the password policies applied to the entire domain

A

fine-grained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

when a users account is disabled after incorrect login attempts; this is called

A

account lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

it identifies the number of incorrect attempts allowed before the account is locked

A

account lockout threshold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

it identifies the length of time the account will be disabled

A

account lockout duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this setting identifies the period of time during which invalid password are entered

A

reset account lockout counter after

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the process of identifying individuals within a system and controlling the level of access each individuals has to resources in that system

A

identity management (IDM)

17
Q

it is a repository for the identity of each user in the organization

A

identity vault

18
Q

this software provides the infrastructure for implementing IDM

A

identity management service

19
Q

the ability to synchronize all aspect of users creation across all system in an organization

A

automated provisioning

20
Q

its the ability to remove the user from the system and revoke user rights to system resources when the users leaves the company

A

automated de-provisioning

21
Q

the synchronization of changes to the users identity

A

automated maintenance