Chapter4: Identity and Access Management Flashcards
- What type of access management controls are used for classified data?
Mandatory Access Control (MAC) is based on the classification of the data. The creator of the data, also known as the owner, is responsible for its classification
- What is the Microsoft authentication method that uses tickets?
The Microsoft authentication method that uses tickets is called Kerberos; it uses updated sequence numbers and timestamps. It can prevent pass the hash and replay attacks.
- What are the three main components of identity and access management? Place them in the correct order.
The first stage is identification is where a username or smart card is used, followed by authentication where a password or pin is inserted, and then the authorization stage where your access to resources is determined.
- What are the three main components of an AAA server?
The three main components of an AAA solution are Authentication, Authorization, and Accounting.
- What are the TCP-based and UDP-based AAA servers? Name three.
The UDP-based AAA solution is RADIUS. The two that are TCP-based are TACACS+ and DIAMETER.
- What is the directory services protocol that stores objects in X500 format?
The directory services protocol that stores object in an X500 format is Lightweight Directory Access Protocol (LDAP).
- What type of access management control is used for the whole company or department?
Rule-based authentication can be used for the whole company or department. For example, contractors are allowed access from 9 a.m. to 5 p.m.
- What type of access management control is used for a subset of a department to complete a subset of duties?
Role-based authentication is used for a subset of a department completing a subset of duties. For example, two people in finance control the petty cash
- What type of account would someone need if they worked in finished goods?
Someone who works in finished goods only needs a standard user account for work purposes.
- What type of account makes it impossible to audit or log an individual user?
A shared account makes it impossible to audit or log to an individual user as several people could use this account.
- What is the most common authentication factor that is rejected if entered incorrectly?
The password is the most common authentication factor that is inserted incorrectly inserted; however, it is rejected by the system.
- What type of authentication model can accept the wrong information yet authenticate the user?
False Acceptance Rate (FAR), used in biometrics, will incorrectly accept an access attempt by unauthorized users.
- What is inserted at the identity portion of identity access management?
The identity portion of access management is where either a username or smart card is inserted to identify the person.
- Explain why a RADIUS or TACACS+ server uses accounting.
RADIUS and TACACS+ are both server use accounting to track when users access and leave a system.
- What happens at the authorization portion of identity access management?
The authorization phase follows identification and authentication; this is where a user’s access is determined.
- What is inserted at the authentication portion of identity access management?
The authentication phase is where a password or pin is inserted.
- What type of identity access management control uses cookies to authenticate users?
Federation services use cookies to authenticate users.
- When we log into a website such as Airbnb and we are asked to enter our Facebook account details for authentication, what type of authentication model are we using?
The protocol being used is OAuth2.0 but the authentication type is known as OpenID Connect.
- When using biometric authentication, how is the crossover error rate measured?
Biometric authentication uses the crossover error rate to measure when the Failure Acceptance Rate is equal to the Failure Rejection Rate (FRR).
- What tools should we use to prevent someone from using CD/DVD drives as well as setting up the password policy for the whole domain?
Group policy can be used to prevent someone from using a CD/DVD drives as well as setting up the password policy for the whole domain