Comptia+ Chapter 7 Flashcards

1
Q

Identity and access management (IAM)

A

Technologies that provide control over user validation and the resources that may be accessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identity proofing

A

Requiring the user to provide proof that they are the unique user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Somewhere you are

A

Authentication, based on where the user is located

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Something you are

A

An authentication method based on the features and characteristics of an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Something you have

A

A type of authentication credential based on the approved user having a specific term in their possession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Something you know

A

Authentication based on something the user knows, but no one else knows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password

A

A secret combination of letters, numbers, and/or characters that only the user should have knowledge of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brute force attack

A

An attack in which every possible combination of letters, numbers, and characters is combined to attempt to determine the user’s password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Password spraying

A

An attack that uses one or a small number of commonly used passwords when trying to log into several different user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hard/soft authentication tokens

A

Hardware and software-based authentication tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multifactor authentication (MFA)

A

Using more than one type of authentication credential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security key

A

A dongle inserted into a USB port or lightning port or held near the device. The key contains all the necessary cryptographic information to authenticate the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attestation

A

A key pair “burned” into a security key during manufacturing and is specific to a device model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Biometrics

A

A category of authentication credentials that rests on the features and characteristics of the individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Salting

A

Adding a random string to a hash algorithm for enhanced security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key stretching

A

A password hashing algorithm that requires significantly more time than standard hashing algorithms to create the digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Password vaulting

A

An enterprise-level system for storing user password credentials in a highly protected database on the organization’s network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Password manager

A

A software application or on my website that stores user passwords along with login information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Default passwords

A

Standard preconfigured, passwords.

20
Q

Reuse

A

Using the same password on multiple accounts

21
Q

Expiration

A

The point in time when a password is no longer valid.

22
Q

Age

A

The period of time that a password must be used before a user can change it.

23
Q

Provisioning

A

Initially, setting up user accounts

24
Q

De-provisioning

A

Removing user accounts

25
Complexity
A disadvantage of automation that introduces complications. Also, the variation of a password's composition.
26
Length
The number of characters that make up a password.
27
Interoperability
The ability of systems to exchange information
28
Federation
Single sign-on for networks owned by different organizations, also called federated identity management (FIM)
29
Single sign-on (SSO)
Using one authentication credential to access multiple accounts or applications
30
Security Assertion Markup Language (SAML)
An Extensible Markup Language (XML) standard that allows secure web domains to exchange user authentication and authorization data
31
Lightweight Directory Access Protocol (LDAP)
A protocol or communication process that enables users to access a network resource through a directory service
32
OAuth (Open Authorization)
An open-source federation framework
33
Passwordless
A new technique for accessing a system without using passwords.
34
Least privilege
Granting access that is limited to what is only necessary for a user to complete their work.
35
Access control
Granting or denying approval to use specific resources once authenticated.
36
Just-in-time permissions
Access control permissions that are immediately elevated to higher-level permissions to perform a specific function before dropping back to normal levels.
37
Time-of-day restrictions
Access levels that are bound to a specific window of time.
38
Temporal accounts
One-time access to an account.
39
Permission assignments and implications
Determining why permissions are given, to whom, and what the impact may be
40
Discretionary Access Control (DAC)
An access control scheme that is the least restrictive, giving an owner total control over objects
41
Mandatory Access Control (MAC)
An access control scheme that is the most restrictive by assigning users' access controls strictly according to the custodian's desires.
42
Role-Based Access Control (RBAC)
An access control scheme that is considered a more "real-world" access control that is based on a user's job function within an organization
43
Rule-Based Access Control
An access control scheme that can dynamically assign roles to subjects based on a set of rules defined by a custodian
44
Attribute-Based Access Control (ABAC)
An access control scheme that uses flexible policies that can combine attributes
45
Access control list (ACL)
A set of permission set is attached to an object
46
Permissions
Authorizations for access control