Chapter 13: Managing Identity and Authentication Flashcards

1
Q

____ indicates who is trusted to perform specific operations.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ is the process of tracking and recording subject activities within logs.

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ____device, or hardware token, is a password-generating device that users can carry with them.

A

token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ratio of false rejections to valid authentications is known as the ____ rate

sometimes called a Type I error

A

false rejection (FRR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ratio of false positives to valid authentications is the____ rate

sometimes called a Type II error

A

false acceptance (FAR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You can compare the overall quality of biometric devices with the ____, also known as the equal error rate (ERR).

A

crossover error rate (CER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is any authentication using two or more factors.

A

Multifactor authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ requires two different proofs of identity to provide authentication.

A

Two-factor authentication (2FA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The _____ provisioning lifecycle refers to the creation, management, and deletion of accounts.

A

identity and access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly