Chapter 2 - Understanding Identity & Access Management . Flashcards
________ allows entities to prove their identity by using credentials known to another entity.
Authentication
________ occurs when a user claims or processes an identity, such as with a username, an email address, a PIV card, or by using biometrics.
Identification
Authentication occurs when an entity provides proof of an identity (such as a password) (T/F) ?
True!
What is the second identity that verifies the authentication?
Authenticator
Your organization is planning to implement remote access capabilities. Management wants strong authentication and wants to ensure that passwords expire after a predefined time interval. Which of the following choices BEST meets this requirement?
A). HOTP
B). TOTP
C). CAC
D). Kerberos
B). TOTP (a time-based one time password).
- passwords created with TOTP expired after 30 seconds.
An HMAC-based One-Time Password (HTOP) creates passwords that do not expire (T/F) ?
True!
Kerberos uses ______ instead of passwords.
Tickets
A network includes a ticket-granting ticket server used for authentication. Which authentication service does this network use?
A). Shibboleth
B). SAML
C). LDAP
D). Kerberos
D). Kerberos
What is a TGT server?
Ticket-granting server. It creates tickets for authentication.
Shibboleth is a federated identity solution used in some single sign-on (SSO) solutions (T/F)?
True!
_______ methods track user activity and record the activity in logs.
Accounting
What are the 5 factors of authentication?
- something you know
- something you have
- something you are
- somewhere you are
- something you do
Which is the least secure form of authentication?
Something you know (refers to a shared secret such as a password).
Strong passwords are complex and at least ____ characters long.
14
_____-_____ password systems automate password recovery.
Self-service
Password policies provide a technical means to ensure users employ secure password practices (T/F) ?
True!