Domain 5 - Identity and Access Management Flashcards

1
Q

Access badges

A

Used to enter secured areas of a facility and are used in conjunction with a badge reader to read information stored on the badge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Control Systems

A

Physical or electronic systems designed to control who, or what, has access to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Account management systems

A

Systems that attempt to streamline the administration of user identity across multiple systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

The process of verifying the identity of the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

The process of defining the specific resources a user needs and determining the type of access to those resources the user may have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptographic Device

A

A hardware device that contains non-programmable logic and non-volatile storage dedicated to all cryptographic operations and protection of private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Electronic authentication (e-authentication)

A

The process of establishing confidence in user identities electronically presented to an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Facility access control

A

Protects enterprise assets and provides a history of who gained access and when the access was granted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identity as a Service (IDaaS)

A

Cloud-based services that broker identity and access management functions to target systems on customers’ premises and/or in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identity proofing

A

The process of collecting and verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be, and establishing a reliable relationsh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Kerberos

A

Developing standard for authenticating network users. Kerberos offers two key benefits: it functions in a multi-vendor network, and it does not transmit passwords over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Logical access controls

A

Protection mechanisms that limit users’ access to information and restrict their forms of access on the system to only what is appropriate for them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC address

A

A 48-bit number (typically represented in hexadecimal format) that is supposed to be globally unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mandatory Access Controls (MACs)

A

Access control that requires the system itself to manage access controls in accordance with the organization’s security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multi-factor Authentication

A

Ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Management System

A

A system that manages passwords consistently across the enterprise

17
Q

Physical Access Control Systems (PACS)

A

Allows authorized security personnel to simultaneously manage and monitor multiple entry points from a single, centralized location

18
Q

Radio Frequency Identification (RFID)

A

A non-contact, automatic identification technology that uses radio signals to identify, track, sort and detect a variety of objects including people, vehicles, goods and assets without the need for direct contact

19
Q

Role-Based Access Control (RBAC)

A

An access control model that bases the access control authorizations on the roles (or functions) that the user is assigned within an organization

20
Q

Rule-Based Access Control

A

An access control model that based on a list of predefined rules that determine what accesses should be granted

21
Q

Security Assertion Markup Language 2.0 (SAML 2.0)

A

A version of the SAML OASIS standard for exchanging authentication and authorization data between security domains

22
Q

Single factor authentication

A

Involves the use of simply one of the three available factors solely in order to carry out the authentication process being requested

23
Q

Single Sign-On (SSO)

A

A unified login experience (from the viewpoint of the end user) when accessing one or more systems

24
Q

Trusted Platform Modules (TPM)

A

A local hardware encryption engine and secured storage for encryption keys

25
Q

User ID

A

Provides the system with a way of uniquely identifying a particular user amongst all the users of that system