Chapter 3: Investigating Identity and Access Management Flashcards

1
Q

This is the process of maintaining the log files that monitor when users login and log out.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is an entity that can validate that the credentials that are present are valid. This identity could be a certificate, token, or details such as a username or password.

A

Identity Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Username
Attribute
Smart Card
Certification
Token
SSH Keys
A

The following can be used when accessing a person’s identity as it needs to be unique to them:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This can be digital that can either be a SAML used for federation services or a token used by Open Authentication (OAuth).

A

Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These are used by an administrator using a secure connection to the server. First of all, the public and private key pair is made. The public key is stored on a server, and the private key is stored on the admin’s desktop.

A

SSH Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This identifier is linked to the account to grant access to the network in a Microsoft Active Directory environment. Once the account with this identifier is deleted, the identifier can never be used again and a new one will need to be created.

A

Security Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This type of account has no real access. This type of account cannot install software – they give users limited access to the computer systems. There are two type of this account– one for the local machine and one for the domain.

A

User Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This type of account is a legacy account that was designed to give limited access to a single computer without the need to create a user account. It is normally disabled because it can be seen as a security threat.

A

Guest Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This type of account is given to external speakers who need access to the internet while delivering their presentation.

A

Sponsored Guest Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TIP

A guest speaker should be allocated a sponsored guest account.

A

TIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This type of account has a much higher access to the system and tend to be used by members of the IT team. Administrators are an example of this type of account.

A

Privilege Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This type of account can install and manage the configuration of a server or a computer. This type of account has the privilege to create, delete, and manage user accounts. An Administrator should have two type of accounts – a user account for routine tasks, and then an admin account to carry out their admin duties.

A

Administrative Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When software is installed on a privilege computer or server, it will need a higher level of privilege to run the software, but at the same time, we need a lower-level admin account so this type of account fits the bill.

A

Service Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TIP

A service account is a type of administrator account used to run an application.

A

TIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This type of account is for when a group of people perform the same duties, such as members of customer services, they can use this type of account. If you are trying to monitor or audit individual employees, then you cannot use this type of account.

A

Shared Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This type of account are default admin accounts created by manufacturers for devices ranging from baby alarms to smart ovens and smart TVs. They all have default usernames and passwords. This becomes a problem for cybercrime because account credentials can be searched online easily, so it is advised to change the username and password associated with those default accounts.

A

Generic Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TIP

If you do not change the password and username for household devices, known as IOT, it is possible for a cybercriminal to hack your home.

A

TIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This type of token requires time synchronization, because the password needs to be used in a very short period of time, normally between 30 and 60 seconds. It could be used when you want to access secure cloud storage or your online bank account:

A

Time-Based One-Time Password (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This type of token is a one-time password. The main distinguishing factor is that there is no time limit.

A

HMAC-Based One-Time Password (HOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is similar to a CAC, but it is used by federal agencies rather than the military.

A

Personal Identity Verification (PIV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is a port-based authentication protocol that is used when a device is connected to a switch or when a user authenticates to a wireless access point. Authentication is normally done by a certificate.

A

1EEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This location-based authentication can be used to block any attempt to login outside of the locations that have been determined as allowed regions. Geolocation can track your location by your IP address and the ISP that you are using.

A

Context-Aware Location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This location-based authentication can be used to identify where your phone is located by using Global Positioning System (GPS).

A

Smart Phone Location Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This location-based authentication is a security feature used by cloud providers such as Microsoft with their Office 365 package to prevent fraud. If someone logs in from Toronto and thirty minutes later log into the service from Las Vegas, their login attempt will be blocked.

A

Impossible Travel Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This location-based authentication is also used by cloud providers where they have a database of the devices used by each user. An email will be sent when the system cannot identify the device used to log in.

A

Risky Login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This is an additional layer of security where the user is authenticated and a SMS message is sent to the user’s phone. They then insert the code that was sent via message and are authenticated; this is has a time limit.

A

SMS Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This technology authentication method can vary from a hardware that has received a one-time password to the fob or card used to gain access to a building via a card reader.

A

Token Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An email is sent to the user when access to their systems has been received by an unusual device; for example, if I access Dropbox from a friend’s laptop.

A

Push Notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This authentication technology method will trigger a phone when someone has accessed a system.

A

Phone Call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

This authentication technology method is an internet standard where the server signs a token with its private key and sends it to a user to prove who they are. It can also be used to digitally sign documents and email. It is used by Open Authentication (OAuth).

A

JavaScript Object Notation Web Token (JWT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

These codes change after a period of time, like a PIN for a smart card. These are commonly used by broadband engineers.

A

Static Codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

This could be using Kerberos, who completes a Ticket Granting Ticket session that results in a ticket that can be exchanged to give access to applications. It could also be used for certificate-based authentication or, in the case of the cloud, use conditional access to gain access to applications.

A

Authentication Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This looks like a USB device and works in conjunction with your password to provide multifactor authentication. An example would be YubiKey.

A

Password Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

These chips are normally built into motherboards of a computer and they become useful when you are using Full Disk Encryption (FDE).

A

Trusted Platform Module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

This is normally used by financial institutions, banks, or email providers to identify someone when they want a password reset.

Two different type of this authentication management:

  • Static KBA
  • Dynamic KBA
A

Knowledge-Based Authentication (KBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

These are questions that are common to the user. For example: “ What is the name of your first school?” These are pretty weak.

A

Static KBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

These are deemed to be more secure because they do not consist of questions provided beforehand.

A

Dynamic KBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

This is an authentication framework allowing point-to-point connections. These are commonly used with wireless communication.

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

This is a version of EAP that encapsulated the EAP data and made it more secure for WLANS.

A

Protected Extensible Authentication Protocol (PEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

This form of EAP was developed by Cisco. It does not use certificates, but protected access credentials instead. It is used in wireless networks.

A

EAP-FAST (Flexible Authentication via Secure Tunneling)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

This form of EAP needs X509 certificates installed on endpoints for authentication.

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

This form of EAP needs the certificates to be installed on the server. It creates a tunnel for the users’ credentials to travel through.

A

EAP-TTLS

43
Q

This server is UDP-based and it authenticates servers such as VPN servers, Remote Access Servers (RAS) servers, and 802.1x authenticating switch. This server could be used to check any remote access policies and verify that authentication was allowed by contacting the domain controller.

A

RADIUS Server

44
Q

These clients could be VPN servers, RAS servers, and the 802.1x authentication switch. Each of these clients needs a private key that is sometimes known as the session key or shared secret to join the RADIUS environment.

RADIUS authentication uses UDP port 1812

RADIUS accounting uses UDP port 1813

A

RADIUS Clients

45
Q

This is a more modern version of RADIUS that works on TCP.

Diameter is the AAA server that uses EAP.

A

Diameter

46
Q

This is the Cisco AAA server that uses TCP, and uses TCP port 49 for authentication.

A

TACACS+

47
Q

Allows someone working remotely, either from a hotel room or home, to connect securely through the internet to the corporate network.

A

Virtual Private Network (VPN)

48
Q

This is a legacy protocol that pre-dated the VPN. This client used modems and a dial-up network using telephone lines. It was very restricted in speed.

A

Remote Access Services (RAS)

49
Q

There are numerous methods of authentication used by VPN or RAS:

  • Password Authentication Protocol (PAP)
  • Challenge Handshake Authentication Protocol (CHAP)
  • MS CHAP/MSCHAP version 2
A

Authentication for VPN/RAS

50
Q

This authentication method for a VPN or RAS should be avoided at all costs as the passwords are transmitted as clear text and can easily captured.

A

Password Authentication Protocol (PAP)

51
Q

This authentication method for a RAS server is done with a four-stage process:

  1. Client makes connection request to RAS
  2. RAS replies with challenge that is a random string.
  3. Client uses password as encryption key to encrypt challenge.
  4. RAS encrypts the original challenge with a password stored for the user. If both values match, the client logs in.
A

Challenge Handshake Authentication Protocol (CHAP)

52
Q

This is Microsoft’s version of MS CHAP. This is the newer version of MS CHAP and can be sued by both VPN and RAS.

A

MS CHAP/MSCHAP version 2

53
Q

This is a solution that helps protect the privilege accounts within a domain, preventing attacks such as pass the hash, pass the ticket, and privilege escalation. This gives visibility in terms of who is using privilege accounts and what tasks they are being used for.

A

Privilege Access Management (PAM)

54
Q

This is a remote forest that has a very high level of security.

A

bastion forest

55
Q

Gives the admin just enough privileges to carry out a certain task.

A

Just Enough Administration (JEA)

56
Q

Manages the users in groups. These store objects such as users and computers as x500 objects. These objects form what is called a distinguished name and are organized and stored by the _____. It is comprised of three different objects, DC (Domain), Organization Unit (OU), and CN(anything else). ____ is the active directory storeman responsible for storing the X500 objects.

A

Lightweight Directory Access Protocol(LDAP)

57
Q

This is the Microsoft authentication protocol introduced with the release of Windows Server 2000. It is the only authentication protocol that uses tickets, Updated Sequence Numbers, and is time stamped. If ____ authentication fails, this is normally down to the user’s computer or device clock being out of sync with the domain controller by 5 minutes or more.

A

Kerberos

58
Q

This is the process for Kerberos for obtaining your service tickets. This is where the user sends their credentials to a domain controller that starts the authentication process and, when it has been confirmed, it will send back a service ticket that has a 10 hour lifespan.

A

Ticket Granting Ticket (TGT)

59
Q

This can be placed on your LAN to keep the domain computers and servers in sync with each other.

A

Network Time Protocol (NTP)

60
Q

This is used to prove who the user is. It exchanges their service ticket for a session ticket. The server then allows them access to the resources.

A

Service Ticket

61
Q

This provides a single sign-on as the user needs to log in only once. It then uses the service ticket to prove who they are, and a session ticket is returned

A

Single Sign-On/Mutual Authentication

62
Q

This is a legacy authentication protocol that stores passwords using the MD4 hash that is very easy to crack. It is susceptible to the pass-the-hash attack. Kerberos prevents the pass-the-hash attack as it uses an encrypted database.

A

NT Lan Manager (NTLM)

63
Q

This is where you have a parent domain and maybe one or more child domains that trust one another so long as the conditions allow it: these are called trees. For example, between the parent domain and each child domain is a two-way transitive trust, where resources can be shared two ways. Since the parent domain trusts both child A and Child B, it can be said that Child A and Child B transitively trust each other as long as admin for each allow it.

A

Transitive trust

64
Q

A term used for a domain; it could be a parent or a child domain.

A

trees

65
Q

TIP

You need to remember that Kerberos is the only authentication protocol that uses tickets. It also prevents replay attacks as it uses USN numbers and timestamps. It can also prevent pass-the-hash attacks.

A

TIP

66
Q

TIP

When the exam mentions a third-party authentication, this can only mean federation services. Federation services require cookies to be enabled.

A

TIP

67
Q

This kind of service is used when two different companies want to authenticate between each other when they participate in a joint venture. The companies don’t want to merge but rather keep their identity and have their own management in place. These are known as third-parties. Each company has their own directory database and normally only has access to their respective domain, but with this type of trust, they can use each others’ domains as long as they have alternative credentials.

A

Federation Services

68
Q

These are extended attributes used by their directory services. They are, in addition to the basic attributes, comprising of the following:

Employee ID
Email Address

A

User-Extended Attributes

69
Q

it is a XML-based authentication, which is used to pass the extended attribute credentials between company A and Company B in a federation service setup.

A

Security Assertion Mark-up Language (SAML)

70
Q

Mr. Red from Company A wants access to limited resources from Company B so he contacts them through a web browser and Company B asks him for his Employee ID and password.

Company B now uses the SAML to pass authentication details of Mr. Red to Company A. Mr. Red’s domain controller confirms that they are correct then Company B sends out a certificate to Mr. Red’s laptop. This certificate is used next time for authentication. They could alternatively use cookies.

A

Federation Services - Authentication and Federation Services - Exchange of Extended Attributes

71
Q

TIP

When the exams mentions authentication using extended attributes, this can only mean federation services. Cookies used for authentication would also be federation services.

A

TIP

72
Q

This is an open source federation service product that uses SAML authentication. It would be used for small federation service environment. This can also use cookies alternatively.

A

Shibboleth

73
Q

This is used in a domain environment. This is where someone logs into the domain and then can access several resources. such as the file or email server, without needing to input their credentials again. Federation services and Kerberos is a good example of ____.

A

Single Sign-on (SSO)

74
Q

Provides authorization to enable third-party applications to obtain limited access to a web service.

A

OAuth 2.0

75
Q

This open authentication method uses OAuth to allow users to log in to a web application without needing to manage the user’s account. It allows users to authenticate by using their google, Facebook, or Twitter account.

A

Open ID Connect

76
Q
  • Fingerprint Scanner
  • Retina Scanner
  • Iris Scanner
  • Voice Recognition
  • Facial Recognition
  • Vein
  • Gait Analysis
A

Authorization via Biometrics

77
Q

Released with Windows 10, it uses an infrared camera making it better than regular cameras as they can have trouble with lighting.

A

Windows Hello

78
Q

It accepts unauthorized users and allows them to gain access. This is known as a Type ll error. Unauthorized users are allowed; look for the middle letter as an A.

A

False Acceptance Rate (FAR)

79
Q

It is where legitimate users who should gain access are rejected and cannot get in. This is known as a Type l error. Authorized users are rejected; look for the middle letter as an R.

A

False Rejection Rate (FRR)

80
Q

TIP

When looking at FAR or FRR, remember to look at the middle letter. Authorized users are rejected, the middle letter in FRR is R for reject. Unauthorized users are allowed so we look for the middle letter being A therefore we get FAR. Remember Authorized that starts with A does not belong to FAR that has an A as the middle letter. A does not select A.

A

Tip

81
Q

This is where the FAR and FRR are equal. If you are going to purchase a biometric system, you need a system that has a low CER.

A

Crossover Error Rate (CER)

82
Q

With a biometric system, you would want one with a low efficacy rate. This can be measured by looking at the CER point. You need a device with a low efficacy rate and a CER of less than 5%.

A

Efficacy Rates

83
Q

Could be more than two different factors; it just means multiple factors.

A

Multi-Factor Authentication

84
Q

This would be username, PIN, or your dare of birth;

A

Something You Know

85
Q

Biometric authentication

A

Something You Are

86
Q

Things like swiping a card, inserting your signature, or your gait.

A

Something You Do

87
Q

The location you are in.

A

Somewhere You Are

88
Q

Security Token, key fob, Date of birth.

A

Something You Have

89
Q

This is made easy by the use of proximity cards, while guards on reception can also control access to the company. We can apply multi-factor authentication by using smart card authentication.

A

On-Premises Authentication

90
Q

This method should adopt a zero-trust model, where every connection is deemed to be a hacker as we cannot see who is logging. We could then use conditional statements to prove who is the person logging in, by using if-then statements. The three areas of conditional access are Signal, Decision, and Enforcement.

A

In The Cloud Authentication

91
Q

This could be user or group, location, device, calculated risk, and the application that needs to be accessed.

A

Signal

92
Q

This could range from allow to block, or require multifactor authentication (MFA).

A

Decision

93
Q

Access to the application that has been approved.

A

Enforcement

94
Q

These providers have a central database of the devices that a person uses to log in. If the system deems that the device cannot be approved, it will notify user of a risky login. If that is not approved, the user will be denied.

A

Cloud Service Providers (CSPs)

95
Q

TIP

In the Sec+ exam, when people move department, they are given new accounts and the old account remains active until it has been disabled.

A

TIP

96
Q

Employing Leaving

Extended Absence Period

Guest Account

A

Reasons for Disabling an Account

97
Q

Process where an auditor will review all the user accounts. If auditor finds anything wrong, they will report their findings to management. They are the snitch.

A

Account Recertification

98
Q

Ensuring that account are created in accordance with the standard naming convention, disabled when the employee initially leaves, and then deleted after a certain time period has been reached.

A

Account Maintenance

99
Q

If you want to know immediately when there is a change to a user account, such as it being given higher privileges, then you need active account monitoring or you need to set up a SIEM system.

A

TIP

100
Q

This system is used for real-time monitoring and can be used to aggregate, decipher, and normalize non-standard log formats; The only time this system will not provide the correct information is when the wrong filters are used or where we scan the wrong host

A

Security Information and Event Management

101
Q
  • Account Management
  • Account Expiry
  • Time and Day Restriction
  • Account Lockout
A

SEIM Filters

102
Q

TIP

If a time restriction is to be placed on a group of contractors, RBAC will be used. Time and day restrictions can only be used for individuals.

A

TIP

103
Q

TIP

If group-based access is used in the exam question, then the solution will be a group-based access solution.

A

TIP

104
Q

Enforce Password History

Password Reuse

Maximum Password Age

Minimum Password Age

Complex Passwords

Store Passwords Using Reversible Encryption (Disable when you can)

Account Lockout - Threshold

Account lockout - Duration

A

Passwords - Group Policy Configurations