Ch 2. Identity and Access Management Flashcards

1
Q

Accounting

A

track user activity and record the activity in logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the five authentication factors?

A

Something you… are, know, have, do; Somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAC/PIV

A

Common Access Card / Personal Identity Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HOTP

A

Hash Based One-Time Password; the algorithm combines a secret key and an incrementing counter, and then creates a hash; the result is then converted into a 6-8 digit value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TOTP

A

like HTOP but a timestamp is used instead of a counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multifactor-Authentication

A

uses two or more factors of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Kerberos

A

network authentication mechanism used within Windows Active Directory domains and some Unix realms; prevent man-in-the-middle attacks and uses tickets to prevent relay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kerberos Requirements

A

method of issuing tickets used for authentication; time synchronization; database of subjects or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NTLM

A

New Technology LAN Manager; a suite of protocols that use a Message Digest hashing algorithm to challenge users and check their credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LDAP

A

Lightweight Directory Access Protocol; specifies formats and methods to query directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSO

A

Single Sign On; refers to the ability of a user to log on or access multiple systems by providing credentials only once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transitive Trust

A

creates an indirect relationship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SAML

A

Security Assertion Markup Language; an XML based standard used to exchange authentication and authorization information between different parties; provides SSO for web apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Federation

A

uses a federated database to provide central authentication in a non-homogeneous environment; links credentials to multiple OS or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shibboleth

A

a free, open-source federated identity solution provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OAuth

A

an open standard for authorization many companies

17
Q

OpenID Connect

A

works with OAuth 2.0 to allow clients (web site) to verify the identity of end users without managing theit credentials

18
Q

Least Privilege

A

a technical control; specifies that individuals and processes are granted only the rights and permissions needed to perform assigned tasks or functions

19
Q

What are the four different account types?

A

End User account; Privileged accounts; Guest accounts; Service accounts

20
Q

Disablement Policy

A

specifies how to manage accounts in different situations

21
Q

Credential

A

a collection of information that provides an identity and proves that identity

22
Q

What are the five access control models?

A

Role-BAC; Rule-BAC; DAC; MAC; ABAC

23
Q

Role-BAC

A

a role-BAC models uses roles based on jobs and functions. A matrix is a planing document that matches the roles with the required privileges

24
Q

Rule-BAC

A

based on a set of approved instructions, such as an access control list.

25
Q

DAC

A

Discretionary Access Control; specifies that every object has an owner, and the owner has full, explicit control of the object. Microsoft NTFS uses the DAC model

26
Q

MAC

A

Mandatory Access Control; uses sensitivity labels for users and data. Commonly used when access needs to be restricted based on a need to know.

27
Q

ABAC

A

Attribute Based Access Control; uses attributes defined in policies to grant access to resources; commonly used in software defined networks