chapter 23 Flashcards

1
Q

CAC

A

Common Access Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EXIF

A

Exchangeable Image File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GPO

A

Group Policy Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IdP

A

Identity Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PIV

A

Personal Identity Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SAML

A

Security Assertion Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XMP

A

Extensible Metadata Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of an SSH key?

A

To be used for automated processes and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of transforming a description of a location, with coordinates, address, or name of place, into a location on the Earth’s surface.

A

Geocoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Location-based marketing that uses GPS, RFID, WiFi or cell data to define a virtual geographical boundary around a certain or specific area.

A

Geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of appending geographic coordinates to media based on the location of a mobile device.

A

Geotagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The primary advantage of using time-of-day restrictions for access.

A

Prevents users from logging onto an enterprise network outside of regular business hours, limiting the risk of outside cyber-attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The primary disadvantage of using time-of-day restrictions for access.

A

Someone that needs to log into their account will have no access outside of business hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a token?

A

To identify specific access rights and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a digital certificate?

A

To verify the identity of the sender/receiver of an electronic message and provide the means to encrypt/decrypt messages between sender and receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How might service accounts be used in batch operations?

A

To be restricted by the admin to only run at night to prevent them from being used by unauthorized personnel.

17
Q

Identification used by DoD military personnel.

A

CAC

18
Q

A smart card used for federal employees and contractors.

A

PIV

19
Q

Used to denote a system or service that creates, maintain, and manages identity information.

A

IdP

20
Q

What are the advantages and disadvantage of using token-based systems?

A

Advantage: Every token is unique so if one is removed from a system, the others won’t be affected.

Disadvantage: Since only the token is authenticated, the theft of the token can be used by anyone regardless of who holds it.

21
Q

How can MFA be used to offset the disadvantage of a token-based system

A

By adding an extra layer of authentication security to mitigate the risk of unauthorized access.

22
Q

What is the primary problem with shared/generic accounts?

A

The ability to easily track the activity of a user.

23
Q

When might an account be automatically be locked out?

A

After an employee is terminated, time frame of inactivity and/or multiple attempts of failed log-ins.

24
Q

Who should configure time-of-day, history and complexity account requirements?

A

Network administrators.

25
Q

An independent verification that the policies associated with it are being followed.

A

Account Audits

26
Q

Full control of files, directories, services and other resources. Has the most power.

A

Admin Account

27
Q

Used for normal everyday tasks, may be limited from installing new programs.

A

Standard account

28
Q

Limited user rights and usually used only one time.

A

Guest Account

29
Q

Which type of account should be disabled by default?

A

Guest Accounts

30
Q

Should both user IDs and password be unique?

A

Yes.

31
Q

When might a network administrator disable an account?

A

If the user no longer uses that account, a breach of security happens, or a period of inactivity.

32
Q

What are SAML, OpenID and OAuth?

A

Token-based authentication process protocols.

33
Q

When a login occurs outside of a geological area while another ones within the enterprise follows suit.

A

Risky Logins

34
Q

Logging into an account off site while logging into it again on site in a very short amount of time.

A

Impossible Travel Time

35
Q

What are identity attributes?

A

Specific characteristics of an identity, like name, department, location, login ID, number, email address, and so on.