Chapter 13: Managing Identity and Authentication Flashcards
____ indicates who is trusted to perform specific operations.
Authorization
_____ is the process of tracking and recording subject activities within logs.
Auditing
A ____device, or hardware token, is a password-generating device that users can carry with them.
token
The ratio of false rejections to valid authentications is known as the ____ rate
sometimes called a Type I error
false rejection (FRR)
The ratio of false positives to valid authentications is the____ rate
sometimes called a Type II error
false acceptance (FAR)
You can compare the overall quality of biometric devices with the ____, also known as the equal error rate (ERR).
crossover error rate (CER)
_____ is any authentication using two or more factors.
Multifactor authentication (MFA)
_____ requires two different proofs of identity to provide authentication.
Two-factor authentication (2FA)
The _____ provisioning lifecycle refers to the creation, management, and deletion of accounts.
identity and access