Ch3 Identity and Access Management Flashcards

1
Q

Authentication is

A

proving you have rights to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorization is

A

proving which rights you have to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the main 3 Authentication factors are _____ another two are ___

A

something you know, something you have, something about you; something you do and somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

combining different types of authorization is called ____ authorization

A

multifactor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ is a system where a central authority decides that since you are trusted on one system, you can be trusted on another

A

Federated Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ are things you can do that have been assigned to you

A

Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ are things that everyone on a system can do

A

rights and privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the idea that just because you need access to data doesn’t mean you need to be able to delete it is an example of _____

A

least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

having one person in charge of recording earnings and a different person in charge of payroll is an example of ____

A

separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ access control might use a label, such as “top secret”

A

mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in ____ access control the owner of the data decides who has access to what

A

discretionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ access control defines access according to rules for groups of people

A

role-based (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ means assuming you are not permitted to do something unless you are listed

A

implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a good password security policy will address which 3 topics?

A

complexity, expiration and history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

in windows ___ you can set rules for passwords, logins and lockouts

A

local security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

windows ___ are like local security policy, but can work across an active directory in windows network server

A

group policy objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

in Linux, use the command ___ to see the permissions for all the files in a directory

A

“ls -l”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

in Linux, permission rights for an object are shown by the three characters ___ repeated 3 times for the ___, ___ and ___ respectively

A

rwx; owner; group; everyone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

to give full permissions in Linux to the owner, but only read permissions to groups and others, use the alphabetical command _____ or the numeric command _____

A

chmod g=r FileName; chmod 744 FileName

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

to change the ownership in Linux of a file, use the command ___

A

sudo chown NewOwner FileName

21
Q

to change the password of a file in Linux, use the command ___

A

sudo passwd [and wait for prompt]

22
Q

in a Windows system, create users and groups with different permissions through the ___ system

A

Computer Management

23
Q

When you change the permissions for a file in Windows, this change is automatically applied to all files in the folder, and subfolders, this is called ___

A

inheritance

24
Q

to override security permissions inheritance for a file, use the _____

A

deny checkbox in the file properties

25
Q

security settings are lost if a file is ___ in the same drive or moved to a ___ drive

A

copied; non-NTFS

26
Q

what happens to file security permissions if you move or copy the file onto another NTFS drive?

A

the file takes on the permissions of the folder you place it into

27
Q

continually monitor ___ and ___ of users in general

A

login/logoff; file access

28
Q

if someone needs to have multiple accounts, then make sure their ___ and ___ are different, and be sure to exercise the principle of ___

A

username; passwords; least privilege

29
Q

in general, enforce non-repudiation by avoiding ___ accounts and ___ usernames

A

shared; generic

30
Q

what is the AAA of access?

A

authentication; authorization; accounting

31
Q

the ___ network security protocol was originally developed for dial-up connections, but is now used for wireless networks

A

Remote Authentication Dial-in User Service (RADIUS)

32
Q

the weakness of RADIUS authentication is that is doesn’t perform ___

A

authorization

33
Q

the user attempting to get authenticated in a RADIUS network is called the ___

A

supplicant

34
Q

RADIUS systems can use up to ___ UDP ports

A

4

35
Q

the ___ system performs both authentication and authorization for networks

A

Terminal Access Controller Access-Control System Plus (TACACS Plus)

36
Q

TACACS systems use TCP port ___

A

49

37
Q

___ is the oldest authentication system, not used anymore because is uses no encryption

A

Password Authentication Protocol (PAP)

38
Q

in a ___ authentication system, the server sends a hash of its key, the client’s key and a question to be answered

A

Challenge Handshake Authentication Protocol (CHAP)

39
Q

a windows ___ authentication system is like a CHAP system done from both sides

A

NT LAN Manager

40
Q

a ___ authentication system works with a windows domain controller between the client and server

A

Kereberos

41
Q

in a Kereberos authentication system, the domain server acts as a ___, granting tickets for access

A

Key Distribution Center (KDC)

42
Q

a Kereberos authentication system uses TCP and UDP port ___

A

88

43
Q

in a Kereberos authentication system, a ___ is used to get a session key

A

Ticket Granting Ticket (TGT)

44
Q

a ___ authentication system is used primarily for web applications, or to access devices that are physically spread out - not for file sharing

A

Security Assertion Markup Language (SAML)

45
Q

___ is not really an authentication protocol, but is used to access someone else’s directory, and uses TCP/UDP port ___

A

Lightweight Directory Access Protocol (LDAP); 389

46
Q

to establish single sign-on to a network of computers, usually you will want to use ___ even if they aren’t running Windows

A

windows active directory

47
Q

to use Windows Active Directory on a network, you must first install ___, then establish a ___

A

Windows Server; Domain

48
Q

the ___ authorization model is based on data labels

A

mandatory access control (MAC)