Chapter 2 - Understanding Identity & Access Management . Flashcards

1
Q

________ allows entities to prove their identity by using credentials known to another entity.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

________ occurs when a user claims or processes an identity, such as with a username, an email address, a PIV card, or by using biometrics.

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication occurs when an entity provides proof of an identity (such as a password) (T/F) ?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the second identity that verifies the authentication?

A

Authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your organization is planning to implement remote access capabilities. Management wants strong authentication and wants to ensure that passwords expire after a predefined time interval. Which of the following choices BEST meets this requirement?

A). HOTP
B). TOTP
C). CAC
D). Kerberos

A

B). TOTP (a time-based one time password).

  • passwords created with TOTP expired after 30 seconds.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An HMAC-based One-Time Password (HTOP) creates passwords that do not expire (T/F) ?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Kerberos uses ______ instead of passwords.

A

Tickets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network includes a ticket-granting ticket server used for authentication. Which authentication service does this network use?

A). Shibboleth
B). SAML
C). LDAP
D). Kerberos

A

D). Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a TGT server?

A

Ticket-granting server. It creates tickets for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Shibboleth is a federated identity solution used in some single sign-on (SSO) solutions (T/F)?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_______ methods track user activity and record the activity in logs.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 5 factors of authentication?

A
  • something you know
  • something you have
  • something you are
  • somewhere you are
  • something you do
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is the least secure form of authentication?

A

Something you know (refers to a shared secret such as a password).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Strong passwords are complex and at least ____ characters long.

A

14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____-_____ password systems automate password recovery.

A

Self-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password policies provide a technical means to ensure users employ secure password practices (T/F) ?

A

True!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Password length specified the ______ number of _______ in the password.

A
  • minimum

- characters

18
Q

_______ _______ ensures passwords are complex and includes at least three of the four character types, such as special characters.

A

Password complexity

19
Q

What remembers past passwords and prevents users from reusing passwords?

A

Password history

20
Q

Your organization is implementing an SDN. Management wants to use an access control model that controls access based on attributes. Which of the following is the BEST solution?

A). DAC
B). MAC
C). Role-BAC
D). ABAC

A

D). Attribute-based access control (ABAC)

21
Q

A Mandatory Access Control (MAC) uses ____ assigned to _____ and _____ ?

A
  • labels
  • subjects
  • objects
22
Q

This access control model uses roles or groups to assign rights and permissions.

A

Role-based access control (role-BAC).

23
Q

This access control model has an owner, and the owner establishes access for the objects.

A

Discretionary access control (DAC).

24
Q

_______ password age is used with password history to prevent users from changing their password repeatedly to get back to the original password.

A

Minimum

25
Q

_______ password age or password expiration forces users to change their password periodically.

A

Maximum

26
Q

______ _____ are credit card-sized cards that have embedded certificates used for authentication. They require. PKI to issue certificates.

A

Smart cards

27
Q

_____ and _____ are open source standards used to create one-time use passwords.

A

HOTP and TOTP

28
Q

HOTP creates a one-time-use password that expires (T/F)?

A

False!

  • the passwords DO NOT expire.
29
Q

TOTP creates a one-time password that expires after ____ seconds?

A

30

30
Q

Biometric methods are the most difficult to falsify (T/F) ?

A

True!

31
Q

What do physical methods of Biometrics include?

A
  • voice
  • facial recognition
  • fingerprints
  • retina scans
  • iris scans
  • palm scans
32
Q

What does the False Acceptance Rate (FAR) or the False Match Rate identify?

A

The percentage of times false acceptance occurs.

33
Q

False Rejection Rate (FRR) or False Nonmatch Rate, identifies what?

A

The percentage of times false rejections occur.

34
Q

What does the Crossover Error Rate (CER) indicate?

A

The quality of the biometric system.

  • lower CERs are better!
35
Q

Single-factor authentication includes one or more authentication methods in the same factor, such as a PIN and a password (T/F) ?

A

True!

36
Q

Dual-factor authentication uses how many factors of identification?

A

Two

  • such as a USB token and a PIN
37
Q

_________ authentication is stronger than any form of single-factor authentication.

A

Multifactor

38
Q

Authentication methods using two or more methods in the same factor are _____ - _____ authentication.

A

Single-factor

Ex: password and a pin are both in the something you know factor, so they only provide single-factor authentication.

39
Q

What happens if a ticket-granting ticket expires?

A

The user might not be able to access resources.

40
Q

_______ specifies formats and methods to query directories. It provides a single point of management for objects, such as users and computers, in an Active Directory domain or Unix realm.

(acronym)

A

LDAP

41
Q

LDAP Secure (LDAPS) encrypts transmissions with ____ or _____ .

(acronym)

A
  • SSL

- TLS

42
Q

_____ _____-___ allows users to authenticate with a single user account and access multiple resources on a network without authenticating again.

A

Single sign-on