CHAPTER 5 - Identity and Access Management Flashcards
Which of the following statements correctly describes biometric methods?
A. They are the least expensive and provide the most protection.
B. They are the most expensive and provide the least protection.
C. They are the least expensive and provide the least protection.
D. They are the most expensive and provide the most protection.
D. Compared with the other available authentication mechanisms, biometric methods
provide the highest level of protection and are the most expensive.
Which of the following statements correctly describes passwords?
A. They are the least expensive and most secure.
B. They are the most expensive and least secure.
C. They are the least expensive and least secure.
D. They are the most expensive and most secure.
C. Passwords provide the least amount of protection, but are the cheapest because they do
not require extra readers (as with smart cards and memory cards), do not require devices
(as do biometrics), and do not require a lot of overhead in processing (as in cryptography).
Passwords are the most common type of authentication method used today.
How is a challenge/response protocol utilized with token device implementations?
A. This protocol is not used; cryptography is used.
B. An authentication service generates a challenge, and the smart token generates a
response based on the challenge.
C. The token challenges the user for a username and password.
D. The token challenges the user’s password against a database of stored credentials.
B. An asynchronous token device is based on challenge/response mechanisms. The
authentication service sends the user a challenge value, which the user enters into the
token. The token encrypts or hashes this value, and the user uses this as her one-time
password.
Which access control method is considered user directed?
A. Nondiscretionary
B. Mandatory
C. Identity-based
D. Discretionary
D. The DAC model allows users, or data owners, the discretion of letting other users access
their resources. DAC is implemented by ACLs, which the data owner can configure.
Which item is not part of a Kerberos authentication implementation?
A. Message authentication code
B. Ticket granting service
C. Authentication service
A. Message authentication code (MAC) is a cryptographic function and is not a key
component of Kerberos. Kerberos is made up of a KDC, a realm of principals (users,
services, applications, and devices), an authentication service, tickets, and a ticket granting
service.
If a company has a high turnover rate, which access control structure is best?
A. Role-based
B. Decentralized
C. Rule-based
D. Discretionary
A. A role-based structure is easier on the administrator because she only has to create one
role, assign all of the necessary rights and permissions to that role, and plug a user into that
role when needed. Otherwise, she would need to assign and extract permissions and rights
on all systems as each individual came and left the company.A. A role-based structure is easier on the administrator because she only has to create one
role, assign all of the necessary rights and permissions to that role, and plug a user into that
role when needed. Otherwise, she would need to assign and extract permissions and rights
on all systems as each individual came and left the company.
The process of mutual authentication involves _______________.
A. a user authenticating to a system and the system authenticating to the user
B. a user authenticating to two systems at the same time
C. a user authenticating to a server and then to a process
D. a user authenticating, receiving a ticket, and then authenticating to a service
A. Mutual authentication means it is happening in both directions. Instead of just the user
having to authenticate to the server, the server also must authenticate to the user.
In discretionary access control security, who has delegation authority to grant access to
data?
A. User
B. Security officer
C. Security policy
D. Owner
D. This question may seem a little confusing if you were stuck between user and owner.
Only the data owner can decide who can access the resources she owns. She may or may
not be a user. A user is not necessarily the owner of the resource. Only the actual owner of
the resource can dictate what subjects can actually access the resource.
Which could be considered a single point of failure within a single sign-on
implementation?
A. Authentication server
B. User’s workstation
C. Logon credentials
D. RADIUS
A. In a single sign-on technology, all users are authenticating to one source. If that source
goes down, authentication requests cannot be processed.
What role does biometrics play in access control?
A. Authorization
B. Authenticity
C. Authentication
D. Accountability
C. Biometrics is a technology that validates an individual’s identity by reading a physical
attribute. In some cases, biometrics can be used for identification, but that was not listed as
an answer choice.
Who or what determines if an organization is going to operate under a discretionary,
mandatory, or nondiscretionary access control model?
A. Administrator
B. Security policy
C. Culture
D. Security levels
B. The security policy sets the tone for the whole security program. It dictates the level of
risk that management and the company are willing to accept. This in turn dictates the type
of controls and mechanisms to put in place to ensure this level of risk is not exceeded.
Which of the following best describes what role-based access control offers companies in
reducing administrative burdens?
A. It allows entities closer to the resources to make decisions about who can and cannot
access resources.
B. It provides a centralized approach for access control, which frees up department
managers.
C. User membership in roles can be easily revoked and new ones established as job
assignments dictate.
D. It enforces enterprise-wide security policies, standards, and guidelines.
C. An administrator does not need to revoke and reassign permissions to individual users
as they change jobs. Instead, the administrator assigns permissions and rights to a role, and
users are plugged into those roles.
Which of the following is the best description of directories that are used in identity
management technology?
A. Most are hierarchical and follow the X.500 standard.
B. Most have a flat architecture and follow the X.400 standard.
C. Most have moved away from LDAP.
D. Many use LDAP.
A. Most enterprises have some type of directory that contains information pertaining to the
company’s network resources and users. Most directories follow a hierarchical database
format, based on the X.500 standard, and a type of protocol, as in Lightweight Directory
Access Protocol (LDAP), that allows subjects and applications to interact with the
directory. Applications can request information about a particular user by making an LDAP
request to the directory, and users can request information about a specific resource by
using a similar request.
Which of the following is not part of user provisioning?
A. Creation and deactivation of user accounts
B. Business process implementation
C. Maintenance and deactivation of user objects and attributes
D. Delegating user administration
B. User provisioning refers to the creation, maintenance, and deactivation of user objects
and attributes as they exist in one or more systems, directories, or applications, in response
to business processes. User provisioning software may include one or more of the
following components: change propagation, self-service workflow, consolidated user
administration, delegated user administration, and federated change control. User objects
may represent employees, contractors, vendors, partners, customers, or other recipients of a
service. Services may include electronic mail, access to a database, access to a file server or
mainframe, and so on.
What is the technology that allows a user to remember just one password?
A. Password generation
B. Password dictionaries
C. Password rainbow tables
D. Password synchronization
D. Password synchronization technologies can allow a user to maintain just one password
across multiple systems. The product will synchronize the password to other systems and
applications, which happens transparently to the user.