Chapter 3: Identity and Access Management Flashcards

1
Q

-identify: each person needs some form of identification so they can prove who they are.

-authentication: the second part after proving identity is to provide authentication for that identity. Example—smart card—PIN

-authorization: once the individual has been authenticated they are given access level based on their job.

-accounting: RADIUS/DIAMETER/TACACS+

A

Identity and Access Management (IAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Username/Attribute/Smart Card/Certificates/Token/SSH Keys

A

Identity Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a credit card token with a certificate embedded on a chip; it is used in conjunction with a PIN

A

Smart Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this is a digital token that can either be a SAML token for federation services or a token used by Open Authentication (OAuth)

A

Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

requires time synchronization because the password needs to be used in a very short period, normally between 30 and 60 seconds.
Example—gives you a code to use within 30 seconds
-type of authentication
-It is commonly used by online services, banks, and websites that need to protect sensitive user accounts from unauthorized access.

A

Time-Based One-Time Password (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is similar to TOTP in that a one time password is issued. The main distinguishing factor is that there is no restriction in terms of time, but you can only use this password once.
-type of authentication
–It is commonly used in hardware tokens or offline authentication methods where devices cannot synchronize with a time server.

A

HMAC-Based One Time Password (HOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are used by the government and military personnel. They are similar to smart cards. On the front side, a CAC is a picture of the user with their service, and the reverse shows their blood group and their Geneva Convention Category.

A

Common Access Card (CAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this is very similar to the CAC but is used by federal agencies rather than the military.

A

Personal Identify Verification (PIV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

uses Ticket Granting Ticket (TGT) session that results in a service ticket that can be exchanged for a session ticket to give access to servers such as an Exchange Server.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

can be a removable device that can be attached to a computer or server via a USB connection. They are used to store encryption keys, a key escrow that holds the private keys for third parties and stores them in an HSM.

A

Hardware Security Module (HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this is normally used by banks, financial institutions, or email providers to identify someone when they want a password reset. There are two types of KBA, dynamic and static, and they have their strengths and weaknesses.

A

Knowledge Based Authentication (KBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

these are questions that are common to the user. For example “what is the name of your first school”

A

Static KBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

these are deemed to be more secure because they do not consist of questions provided beforehand. Example—a bank wants to confirm the identity of a customer and they ask the customer to name three direct debit mandates, the date, and amount paid.

A

Dynamic KBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

authentication framework allowing point to point connections. These are commonly used with wireless connection.

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is a version of EAP that encapsulates data I the TLS tunnel, ensuring it is secure for WLANS. PEAP only needs a certificate installed on the server.

A

Protected Extensible Authentication Protocol (PEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flexible Authentication Secure Tunneling, developed by CISCO, does not use certificates but protected access credentials instead. It is used in wireless networks.

A

EAP-FAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

need X509 certificates installed on endpoints for authentication

A

EAP TLS

18
Q

needs the certificates installed on the server. It creates a tunnel for the users credentials to travel through

A

EAP TTLS

19
Q

where you have a parent domain and maybe one or more child domains, called trees.

A

Transitive Trust

20
Q

Third Party to Third Party Authentication; can use cookies for authentication

A

Federation Services

21
Q

are extended attributes used by their directory services.
–authentication using extended attributes can only be federation services—cookies used for authentication would also be federation services

A

User Extended Attributes

22
Q

open source federation service product that uses SAML authentication; it would be used in a small federation services environment; can use cookies.

A

Shibboleth

23
Q

when an IdP provides a mechanism that can prove the identity of a user.
-when using Oauth a token is provided
-when using Kerberos a ticket is provided
-when using federation services provides a cookie
-certifciate based provides a key

A

Attestation

24
Q

is used in a domain environment; this is where someone logs in to the domain and then can access several resources such as the file or email server, without needing to input their credentials again.
-Federation services and Kerberos are both good examples of SSO

A

Single Sign On (SSO)

25
Q

provides authorization to enable third party applications to obtain limited access to a web service

A

OAuth 2.0

26
Q

uses OAuth to allow users to log in to a web application without needing to manage the users account; it allows users to authenticate using their facebook, google, or twitter accounts

A

OpenID Connect

27
Q

uses individual’s characteristics, for example, using a fingerprint.
-Fingerprint scanner
-Retina Scanner
-Iris Scanner
-Voice Recognition
-Facial Regonition
-Vein
-Gait analysis

A

Biometrics

28
Q

accepts unauthorized users and allows them to gain access (type2 error)

A

False Acceptance Rate (FAR)

29
Q

when legitimate users who should gain access are rejected and cannot get in (type 1 error)

A

False Rejection Rate (FRR)

30
Q

This is where FRR and FAR are equal. You need a system with a low CER

A

Crossover Error Rate (CER)

31
Q

smart card with pin

A

Multi-Factor Authentication

32
Q

This would be a username, password, PIN, or date of birth;

A

Something You Know

33
Q

secure token, key fob, or card; hardware token is tamper-proof and sends a different Pin every 60 seconds

A

Something You Have

34
Q

biometric authentication; trait of an individual that is used for authentication; iris or retina, palm, vein, fingerprint reader or voice

A

Something You Are

35
Q

swiping a card, inserting your signature, or maybe the way you walk; dwell time, the speed that you type and how far in you press the keys

A

Something You Do

36
Q

Location you are in (authentication factor)

A

Somewhere You Are

37
Q

If I have a username, password, and PIN, then it is _____

A

single factor (came from all the same group–something you know)

38
Q

If you have a token and a password

A

Two-Factor

39
Q

This is where more than one factor; smart card (something you have)/inserting it into the reader(something you do)/then inserting the PIN (something you know)

A

Multifactor

40
Q

have a central database of devices that a person uses to login. If the system deems that the device cannot be approved, it will notify the user of the risky login. If it is not approved, then the user access will be blocked.
-when employee leaves the company the account should be disabled and password should be reset

A

Cloud Service Provider

41
Q

system is used for real-time monitoring and can be used to aggregate, decipher, and normalize non-standard log formats; it can also filter out false positives.

A

Security Information and Event Management (SIEM)