Domain 5, IAM Flashcards

1
Q

What is a two way trust?

A

Trust flows in both directions bewteen two domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In Kerberos, what grants ticket granting tickets?

A

Authentication service via the KDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Kerberos, what does the authentication service do?

A

Issues ticket granting tickets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which federated ID management is a protocol for exchanging authentication between domains?

A

SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which federated ID management is an HTTP service?

A

OAUTH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which identity assurance level is the most strict?

A

IAL 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the FICAM Roadmap concerned with?

A

Provisioning and de-provisioning process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the procedures of the provisioning and de-provisioning process

A

Provision a user account and apply user permissions - user request, owner validate, app admin create account, notify
Modify user permissions - user request, resource owner validate, app admin modify, notify
Deprovision user account and end user permissions - resource owner notification, app admin removal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a shortcut trust?

A

A trust that is explicitly defined in addition to the trust relationships already created between domains in a forest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are four types of domain trusts?

A

One way
Two Way
Short cut
External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the parts to IDaaS?

A

IGA - identity governance and administration - provisioning of users to cloud applications and password reset functionality
Access - user authentication, SSO, authorization, federation
Intelligence - identity access log monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Kerberos, what identifies a service?

A

Service principal name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the OAUTH roles?

A

Resource Owner
Resource Server
Client Application
Authorization Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SOAP?

A

Simple object access protocol
An XML structure for messages over HTTP, used to exchange structured information to web services. It is encapsulated data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an external trust?

A

Used between forests and organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which message protocol is often identified by encapsulation?

17
Q

In Kerberos, what identifies a user?

A

User principal name

18
Q

In Kerberos, what does the user principal name do?

A

Identifies a user

19
Q

Which IAL is self asserted?

20
Q

What is SASL?

A

Simple authentication and security layer, a framework for authentication and data security in internet protocols. It is non-proprietary and decentralized. Works with a variety of authentication methods and can be used for directory access.

21
Q

What are the objects in the access control MAC?

A

Files
folders
print queues
devices

22
Q

What could be consulted to see what a subject could do to an object?

A

Capability table

23
Q

How does MAC treat subjects and objects?

A

Subjects are active and objects are passive upon which subjects act.

24
Q

What are the steps in provisioning a user account and applying permissions?

A

The user requests access
The resource owner validates the request
The application administrator creates the account and applies permission
The user is notified

25
What are the types and particular issues with biometrics?
Type 1 - FRR - False Rejection Rate Type 2 - FAR - False Acceptance Rate CER - Crossover Error Rate
26
What are the SAML roles?
Identity Provider Service Provider / Relying Party User / Principal
27
What are the parts of the credential enrollment process?
``` Sponsorship Enrollment Credential Production Issuance Credential Lifecycle Management ```
28
In kerberos, what validates ticket granting tickets?
Ticket granting service
29
In Kerberos, what does a ticket granting service do?
Validates the ticket granting ticket and grants a service ticket.
30
What are the steps in de-provisioning access?
The resource owner notifies the application administrator | The application administrator removes the access
31
What are the Identity Assurance Levels?
IAL 1 - attributes are self asserted IAL 2 - remote or in person identity proofing is required IAL 3 - in person identity proofing is required and verified by a Credential Service Provider
32
What is a capability table?
A table of subjects and objects indicating what actions individuals can take upon individual objects.
33
What is a one way trust?
Trust flows in one direction from one domain to another.
34
What is FICAM
Federated Identity, Credential, and Access Management
35
What are the special SIDs for Windows?
500 - Admin 501 - Guest 512 - Domain Admin
36
What are the steps in modifying user permissions?
The user requests permission modification The resource owner validates the request The application administrator modifies the permissions The user is notified