Chapter 2 Understanding Identity and Access Management Flashcards

1
Q

Allowing entities to prove their identity by using credentials know to another entity is

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication occurs when an entity provides proof of an identity (such as a password). A second identity is the authenticator and it verifies the authentication.

A

Authorization provides access to resources based on a proven identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accounting methods track user activity and record the activity in logs.

A
Five factors of authentication are:
Something you know,
Something you have,
Something you are,
Somewhere you are,
Something you do.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passwords should be strong and changed often. Complex passwords include multiple character types. Strong passwords are complex and at least 14 characters long.

A

Administrators should verify a user’s identity before resetting the user’s password. When resetting passwords manually, administrators should configure them as temporary passwords that expire after the first use, requiring users to create a new password the first time they log on. Self-service password systems automate password recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Password policies provide a technical means to ensure users employ secure password practices.

A

Password length specifies the minimum number of characters in the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Password complexity ensures passwords are complex and include Password complexity ensures passwords are complex and include at least three of the four character types, such as special characters.

A

Password history remembers past passwords and prevents users from reusing passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Minimum password age is used with password history to prevent users from changing their password repeatedly to get back to the original password.

A

Maximum password age or password expiration forces users to change their password periodically. When administrators reset user passwords, the password should expire upon first use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Password policies should apply to any entity using a password. This includes user accounts and accounts used by services and applications. Applications with internally created passwords should still adhere to the organization’s password policy.

A

Account lockout policies lock out an account after a user enters an incorrect password too many times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Smart cards are credit card-sized cards that have embedded certificates used for authentication. They require a PKI to issue certificates.

A

Common Access Cards (CACs) and Personal Identity Verification (PIV) cards can be used as photo IDs and as smart cards (both identification and authentication).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tokens (or key fobs) display numbers in an LCD. These numbers provide rolling, one-time use passwords and are synchronized with a server. USB tokens include an embedded chip and a USB connection. Generically, these are called hardware tokens.

A

HOTP and TOTP are open source standards used to create one-time-use passwords. HOTP creates a one-time-use password that does not expire until it is used and TOTP creates a one-time password that expires after 30 seconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Biometric methods are the most difficult to falsify. Physical methods include voice and facial recognition, fingerprints, retina scans, iris scans, and palm scans. Biometric methods can also be used for identification.

A

The false acceptance rate (FAR), or false match rate, identifies the percentage of times false acceptance occurs. The false rejection rate (FRR), or false nonmatch rate, identifies the percentage of times false rejections occur. The crossover error rate (CER) indicates the quality of the biometric system. Lower CERs are better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Single-factor authentication includes one or more authentication methods in the same factor, such as a PIN and a password. Dual-factor (or two-factor) authentication uses two factors of authentication,

A

such as a USB token and a PIN. Multifactor authentication uses two or more factors. Multifactor authentication is stronger than any form of single-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication methods using two or more methods in the same factor are single-factor authentication. For example, a password and a PIN are both in the something you know factor, so they only provide single-factor authentication.

A

Kerberos is a network authentication protocol using tickets issued by a KDC or TGT server. If a ticket-granting ticket expires, the user might not be able to access resources. Microsoft Active Directory domains and Unix realms use Kerberos for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LDAP specifies formats and methods to query directories. It provides a single point of management for objects, such as users and computers, in an Active Directory domain or Unix realm. The following is an example of an LDAP string: LDAP:// CN = Homer, CN = Users, DC = GetCertifiedGetAhead, DC = com

A

LDAP Secure (LDAPS) encrypts transmissions with SSL or TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Single sign-on (SSO) allows users to authenticate with a single user account and access multiple resources on a network without authenticating again.

A

SSO can be used to provide central authentication with a federated database and use this authentication in an environment with different operating systems (nonhomogeneous environment).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAML is an XML-based standard used to exchange authentication and authorization information between different parties. SAML is used with web-based applications.

A

A federated identity links a user’s credentials from different networks or operating systems, but the federation treats it as one identity.

17
Q

Shibboleth is an open source federated identity solution that includes Open SAML libraries.

A

OAuth and OpenID Connect are used by many web sites to streamline the authentication process for users. They allow users to log on to many web sites with another account, such as one they’ve created with Google, Facebook, PayPal, Microsoft, or Twitter.

18
Q

The principle of least privilege is a technical control that uses access controls. It specifies that individuals or processes are granted only the rights and permissions needed to perform assigned tasks or functions, but no more.

A

Users should not share accounts. It prevents effective identification, authentication, authorization, and accounting. Most organizations ensure the Guest account is disabled.

19
Q

Account policies often require administrators to have two accounts (an administrator account and a standard user account) to prevent privilege escalation and other attacks.

A

An account disablement policy ensures that inactive accounts are disabled. Accounts for employees who either resign or are terminated should be disabled as soon as possible. Configuring expiration dates on temporary accounts ensures they are disabled automatically.

20
Q

Time restrictions can prevent users from logging on or accessing network resources during specific hours. Location-based policies prevent users from logging on from certain locations.

A

Accounts should be recertified to verify they are still required. For example, if the organization extends a contract, it’s a simple matter to recertify the account. Administrators verify that the contract has been extended, change the expiration date, and enable the account.

21
Q

Administrators routinely perform account maintenance. This is often done with scripts to automate the processes and includes deleting accounts that are no longer needed.

A

Credential management systems store and simplify the use of credentials for users. When users access web sites needing credentials, the system automatically retrieves the stored credentials and submits them to the web site.

22
Q

The role-based access control (role-BAC) model uses roles to grant access by placing users into roles based on their assigned jobs, functions, or tasks.

A

A matrix matching job titles with required privileges is useful as a planning document when using role-BAC.

23
Q

Group-based privileges are a form of role-BAC. Administrators create groups, add users to the groups, and then assign permissions to the groups.

A

This simplifies administration because administrators do not have to assign permissions to users individually.

24
Q

The rule-based access control (rule-BAC) model is based on a set of approved instructions, such as ACL rules in a firewall. Some rule-BAC implementations use rules that trigger in response to an event, such as modifying ACLs after detecting an attack.

A

In the discretionary access control (DAC) model, every object has an owner. The owner has explicit access and establishes access for any other user. Microsoft NTFS uses the DAC model, with every object having a discretionary access control list (DACL). The DACL identifies who has access and what access they are granted. A major flaw of the DAC model is its susceptibility to Trojan horses.

25
Q

Mandatory access control (MAC) uses security or sensitivity labels to identify objects (what you’ll secure) and subjects (users). It is often used when access needs to be restricted based on a need to know. The administrator establishes access based on predefined security labels. These labels are often defined with a lattice to specify the upper and lower security boundaries.

A

An attribute-based access control (ABAC) evaluates attributes and grants access based on the value of these attributes. It is used in many software defined networks (SDNs).

26
Q

Identification occurs when a user claims or professes an identity, such as with a user-name, email address, a PIV card, or by using biometris.

A

Authentication occurs when an entity provides proof of an identity (such as a password). A second identity is the authenticator and it verifies the authentication.

27
Q

Authorization provides access to resources based on a proven identity.

A

Accounting methods track user activity and record the activity in logs.

28
Q

What are the five factors of authentication

A

Something you know, have, something you are, where you are, and something you do.

29
Q

Passwords should be strong and changed often. Complex passwords include multiple characters types. Strong passwords are complex and at least 14 characters long.

A

Administrators should verify a user’s identity before resetting the user’s password.

30
Q

when resetting passwords manually, administrators should configure them as temporary passwords that expire after the first use, requiring users to create a new password the first time they log on.

A

page 131