chapter 23 Flashcards

1
Q

CAC

A

Common Access Cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EXIF

A

Exchangeable Image File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

GPO

A

Group Policy Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IdP

A

Identity Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PIV

A

Personal Identity Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SAML

A

Security Assertion Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XMP

A

Extensible Metadata Platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of an SSH key?

A

To be used for automated processes and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The process of transforming a description of a location, with coordinates, address, or name of place, into a location on the Earth’s surface.

A

Geocoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Location-based marketing that uses GPS, RFID, WiFi or cell data to define a virtual geographical boundary around a certain or specific area.

A

Geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The process of appending geographic coordinates to media based on the location of a mobile device.

A

Geotagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The primary advantage of using time-of-day restrictions for access.

A

Prevents users from logging onto an enterprise network outside of regular business hours, limiting the risk of outside cyber-attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The primary disadvantage of using time-of-day restrictions for access.

A

Someone that needs to log into their account will have no access outside of business hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a token?

A

To identify specific access rights and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a digital certificate?

A

To verify the identity of the sender/receiver of an electronic message and provide the means to encrypt/decrypt messages between sender and receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How might service accounts be used in batch operations?

A

To be restricted by the admin to only run at night to prevent them from being used by unauthorized personnel.

17
Q

Identification used by DoD military personnel.

18
Q

A smart card used for federal employees and contractors.

19
Q

Used to denote a system or service that creates, maintain, and manages identity information.

20
Q

What are the advantages and disadvantage of using token-based systems?

A

Advantage: Every token is unique so if one is removed from a system, the others won’t be affected.

Disadvantage: Since only the token is authenticated, the theft of the token can be used by anyone regardless of who holds it.

21
Q

How can MFA be used to offset the disadvantage of a token-based system

A

By adding an extra layer of authentication security to mitigate the risk of unauthorized access.

22
Q

What is the primary problem with shared/generic accounts?

A

The ability to easily track the activity of a user.

23
Q

When might an account be automatically be locked out?

A

After an employee is terminated, time frame of inactivity and/or multiple attempts of failed log-ins.

24
Q

Who should configure time-of-day, history and complexity account requirements?

A

Network administrators.

25
An independent verification that the policies associated with it are being followed.
Account Audits
26
Full control of files, directories, services and other resources. Has the most power.
Admin Account
27
Used for normal everyday tasks, may be limited from installing new programs.
Standard account
28
Limited user rights and usually used only one time.
Guest Account
29
Which type of account should be disabled by default?
Guest Accounts
30
Should both user IDs and password be unique?
Yes.
31
When might a network administrator disable an account?
If the user no longer uses that account, a breach of security happens, or a period of inactivity.
32
What are SAML, OpenID and OAuth?
Token-based authentication process protocols.
33
When a login occurs outside of a geological area while another ones within the enterprise follows suit.
Risky Logins
34
Logging into an account off site while logging into it again on site in a very short amount of time.
Impossible Travel Time
35
What are identity attributes?
Specific characteristics of an identity, like name, department, location, login ID, number, email address, and so on.