Domain 5 Identity and Access Management Flashcards

1
Q

Which type of password provides MAXIMUM security because a new password is required for each new log-on?

A

One-time or dynamic password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can be defined as a table of subjects and objects indicating what actions individual subjects can take upon individual objects?

A

An access control matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are memory cards and smart cards different?

A

Memory cards have no processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following access control models introduces user security clearance and data classification?

A

Mandatory access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most access violations are:

A

Accidental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which biometric method analyzes the speed of signing (stroke), and the pressure the signer exerts to generate a signature?

A

Signature Dynamics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A central authority determines what subjects can have access to certain objects based on the organizational structure is called:

A

Non-Discretionary Access Control

A central authority determines what subjects can have access to certain objects based on the organizational security policy.

The key focal point of this question is the ‘central authority’ that determines access rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is called the verification that the user’s claimed identity is valid and is usually implemented through a user password at log-on time?

A

Authentication

Authentication is verification that the user’s claimed identity is valid and is usually implemented through a user password at log-on time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the LEAST user accepted biometric device?

A

Retina scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which access control model is best suited in an environment where a high security level is required and where it is desired that only the administrator grants access control?

A

MAC
MAC provides high security by regulating access based on the clearance of individual users and sensitivity labels for each object. Clearance levels and sensitivity levels cannot be modified by individual users – for example, user Joe (SECRET clearance) cannot reclassify the “Presidential Doughnut Recipe” from “SECRET” to “CONFIDENTIAL” so that his friend Jane (CONFIDENTIAL clearance) can read it. The administrator is ultimately responsible for configuring this protection in accordance with security policy and directives from the Data Owner.

DAC is incorrect. In DAC, the data owner is responsible for controlling access to the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following access control models requires defining classification for objects?

A

Mandatory Access Control

With mandatory access control (MAC), the authorization of a subject’s access to an object is dependant upon labels, which indicate the subject’s clearance, and classification of objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of security control is also known as “Logical” control?

A

Technical:Technical security controls are also called Logical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which access control method allows the data owner (the person who created the file) to control access to the information they own?

A

DAC - Discretionary Access Control

DAC - Discretionary Access Control is where the user controls access to the data they create or manage.

It is the least secure method of access control because of a few factors:

  • Employee changeover can lead to confusion of data ownership or abandoned data.
  • Employees are not traditionally experienced enough to manage data permissions and maintain them in a reliable fashion.
  • People in general are the least reliable component of any organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following pairings uses technology to enforce access control policies within systems?

A

Preventive/Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following access control models is based on sensitivity labels?

A

Mandatory access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Smart cards are an example of which type of control?

A

Technical control

Logical or technical controls involve the restriction of access to systems and the protection of information. Smart cards and encryption are examples of these types of control.

Controls are put into place to reduce the risk an organization faces, and they come in three main flavors: administrative, technical, and physical. Administrative controls are commonly referred to as “soft controls” because they are more management-oriented. Examples of administrative controls are security documentation, risk management, personnel security, and training. Technical controls (also called logical controls) are software or hardware components, as in firewalls, IDS, encryption, identification and authentication mechanisms. And physical controls are items put into place to protect facility, personnel, and resources. Examples of physical controls are security guards, locks, fencing, and lighting.

Many types of technical controls enable a user to access a system and the resources within that system. A technical control may be a username and password combination, a Kerberos implementation, biometrics, public key infrastructure (PKI), RADIUS, TACACS +, or authentication using a smart card through a reader connected to a system. These technologies verify the user is who he says he is by using different types of authentication methods. Once a user is properly authenticated, he can be authorized and allowed access to network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following would be used to compare accuracy of biometric devices?

A

CER

equal error rate or crossover error rate (EER or CER): the rate at which both accept and reject errors are equal. The value of the EER can be easily obtained from the ROC curve. The EER is a quick way to compare the accuracy of devices with different ROC curves. In general, the device with the lowest EER is most accurate.

The following are used as performance metrics for biometric systems:

false accept rate or false match rate (FAR or FMR): the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. In case of similarity scale, if the person is imposter in real, but the matching score is higher than the threshold, then he is treated as genuine that increase the FAR and hence performance also depends upon the selection of threshold value.

false reject rate or false non-match rate (FRR or FNMR): the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percent of valid inputs which are incorrectly rejected.

failure to enroll rate (FTE or FER): the rate at which attempts to create a template from an input is unsuccessful. This is most commonly caused by low quality inputs.

failure to capture rate (FTC): Within automatic systems, the probability that the system fails to detect a biometric input when presented correctly.

template capacity: the maximum number of sets of data which can be stored in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following terms BEST describes linking of a person’s electronic identity and attributes for use across identity management systems and uses SAML to exchange authentication and authorization data?

A

Federated ID

The term Federated ID describes a common set of standards, policies and protocols to coordinate access between separate domains while avoiding making users authenticate to that other domain.

SAML - Security Assertion Markup Language is an XML standard for exchanging authentication and authorization data. It supports the Federated ID concept and addresses most importantly web browser single sign-on or SSO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Crossover Error Rate (CER) –

A

describes the point where the False Reject Rate (FRR) and False Accept Rate (FAR) are equal.
CER is also known as the Equal Error Rate (EER). The Crossover Error Rate describes the overall accuracy of a biometric system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Discretionary Access Control (DAC) –

A

gives subjects full control of objects they have created or been given access to, including sharing the objects with other subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

False Accept Rate (FAR) –

A

occurs when an unauthorized subject is accepted by the biometric system as valid. Also called a Type II error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

False Reject Rate (FRR) –

A

occurs when an authorized subject is rejected by the biometric system as unauthorized. Also called a Type I error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Mandatory Access Control (MAC) –

A

system-enforced access control based on subject’s clearances and object’s labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Role-Based Access Controls (RBAC) –

A

subjects are grouped into roles and each defined role has access permissions based upon the role, not the individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Rainbow table

A

acts as a database that contains the pre-computed hashed output for most or all possible passwords. Rainbow tables take a considerable amount of time to generate and are not always complete: they may not include all possible password/ hash combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A hybrid attack

A

appends, prepends, or changes characters in words from a dictionary before hashing, to attempt the fastest crack of complex passwords. For example, an attacker may have a dictionary of potential system administrator passwords but also replaces each letter “o” with the number “0”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

minimum password management security features include the following:

A

Password history = set to remember 24 passwords
• Maximum password age = 90 days
• Minimum password age = 2 days (this is because users do not cycle through 24 passwords to return immediately to their favorite)
• Minimum password length = 8 characters
• Passwords must meet complexity requirements = true
• Store password using reversible encryption = false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Synchronous dynamic tokens

A

Synchronous dynamic tokens use time or counters to synchronize a displayed token code with the code expected by the authentication server: the codes are synchronized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Asynchronous Dynamic Token

A

The most common variety is challenge-response tokens. Challenge-response token authentication systems produce a challenge, or input for the token device. Then the user manually enters the information into the device along with their PIN, and the device produces an output. This output is then sent to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Throughput

A

the process of authenticating to a biometric system. This is also called the biometric system response time. A typical throughput is 6– 10 seconds.

31
Q

Centralized Access Control

A

Centralized access control concentrates access control in one logical point for a system or organization. Instead of using local access control databases, systems authenticate via third-party authentication servers. Centralized access control can be used to provide Single Sign-On (SSO),

32
Q

three “A’s” of access control:

A

Authentication, Authorization, and Accountability.

Authentication: proving an identity claim

Authorization: actions authenticated subjects are allowed to perform on a system

Accountability: the ability to audit a system and demonstrate the actions of subjects

33
Q

Decentralized Access Control

A

Decentralized access control allows IT administration to occur closer to the mission and operations of the organization. In decentralized access control, an organization spans multiple locations, and the local sites support and maintain independent systems, access control databases, and data. Decentralized access control is also called distributed access control.

34
Q

Single Sign-On (SSO)

A

Single Sign-On (SSO) allows multiple systems to use a central authentication server (AS). This allows users to authenticate once, and then access multiple, different systems. It also allows security administrators to add, change, or revoke user privileges on one central system.

35
Q

Federated Identity Management

A

Federated Identity Management (FIdM) applies Single Sign On at a much wider scale: ranging from cross-organization to Internet scale. It is sometimes simply called Identity Management (IdM).
creating a trusted authority for digital identities across multiple organizations. In a federated system, participating institutions share identity attributes based on agreed-upon standards, facilitating authentication from other members of the federation and granting appropriate access to online resources.

36
Q

SAML

A

FIdM may use OpenID or SAML (Security Association Markup Language). SAML is an XML-based framework for exchanging security information, including authentication data.

37
Q

Identity as a Service (IDaaS)

A

Identity as a Service (IDaaS), or cloud identity, allows organizations to leverage cloud service for identity management.

38
Q

LDAP

A

Lightweight Directory Access Protocol (LDAP) provides a common open protocol for interfacing and querying directory service information provided by network operating systems. LDAP is widely used for the overwhelming majority of internal identity services including, most notably, Active Directory.
LDAP is an application layer protocol that uses port 389 via TCP or UDP. LDAP queries can be transmitted in cleartext and, depending upon configuration, can allow for some or all data to be queried anonymously.
secure communication channels leveraging TLS.

39
Q

Kerberos

A

Kerberos is a third-party authentication service that may be used to support Single Sign-On.
Kerberos uses symmetric encryption and provides mutual authentication
current version of Kerberos is version 5, described by RFC 4120

Kerberos has the following components: • Principal: Client (user) or service • Realm: A logical Kerberos network • Ticket: Data that authenticates a principal’s identity • Credentials: a ticket and a service key • KDC: Key Distribution Center, which authenticates principals • TGS: Ticket Granting Service • TGT: Ticket Granting Ticket • C/ S: Client/ Server, regarding communications between the two

Kerberos Operational Steps
1. Kerberos Principal Alice contacts the KDC (Key Distribution Center, which acts as an authentication server), requesting authentication.
2. The KDC sends Alice a session key, encrypted with Alice’s secret key. The KDC also sends a TGT (Ticket Granting Ticket), encrypted with the TGS’s secret key.
3. Alice decrypts the session key and uses it to request permission to print from the TGS (Ticket Granting Service).
4. Seeing Alice has a valid session key (and therefore has proven her identity claim), the TGS sends Alice a C/ S session key (second session key) to use to print. The TGS also sends a service ticket, encrypted with the
printer’s key.
5. Alice connects to the printer. The printer, seeing a valid C/ S session key, knows Alice has permission to print, and also knows that Alice is authentic.

40
Q

SESAME

A

SESAME stands for Secure European System for Applications in a Multi-vendor Environment, a single sign-on system that supports heterogeneous environments.

“SESAME adds to Kerberos: heterogeneity, sophisticated access control features, scalability of public key systems, better manageability, audit and delegation.” [15] Of those improvements, the addition of public key (asymmetric) encryption is the most compelling. It addresses one of the biggest weaknesses in Kerberos: the plaintext storage of symmetric keys.

41
Q

Access Control Protocols and Frameworks

A

RADIUS, Diameter, TACACS/ TACACS +, PAP and CHAP, and Microsoft Active Directory.

42
Q

RADIUS

A

The Remote Authentication Dial In User Service (RADIUS) protocol is a third-party authentication system. RADIUS is described in RFCs 2865 and 2866, and uses the User Datagram Protocol (UDP) ports 1812 (authentication) and 1813 (accounting).

RADIUS is considered a “AAA” system, comprised of three components: authentication, authorization, and accounting.

43
Q

Diameter

A

Diameter is RADIUS’ successor, designed to provide an improved Authentication, Authorization, and Accounting (AAA) framework. RADIUS provides limited accountability, and has problems with flexibility, scalability, reliability, and security. Diameter also uses Attribute Value Pairs, but supports many more: while RADIUS uses 8 bits for the AVP field (allowing 256 total possible AVPs), Diameter uses 32 bits for the AVP field

Diameter provides AAA functionality, but in addition it is made more reliable by using the Transmission Control Protocol (TCP). Diameter is described by RFC 6733

44
Q

TACACS and TACACS +

A

The Terminal Access Controller Access Control System (TACACS) is a centralized access control system that requires users to send an ID and static (reusable) password for authentication. TACACS uses UDP port 49 (and may also use TCP). Reusable passwords are a vulnerability: the improved TACACS + provides better password protection by allowing two-factor strong authentication. It is important to note that TACACS + is not backwards compatible with TACACS. TACACS + uses TCP port 49 for authentication with the TACACS + server.

45
Q

PAP

A

The Password Authentication Protocol (PAP) is defined by RFC 1334 and is referred to as being, “not a strong authentication method.” [17] A user enters a password and it is sent across the network in clear text. When received by the PAP server, it is authenticated and validated.

46
Q

CHAP

A

Challenge Handshake Authentication Protocol (CHAP) is defined by RFC 1994 (http:// tools.ietf.org/ html/ rfc1994) and provides protection against playback attacks. It uses a central location that challenges remote users.

CHAP depends upon a ‘secret’ known only to the authenticator and the peer. The secret is not sent over the link.

47
Q

Microsoft Active Directory Domains

A

Microsoft Windows Active Directory uses the concept of domains as the primary means to control access.
authentication of trust relationships on RFC 1510, the Kerberos Authentication Protocol, and it has been integrated into Microsoft Windows operating systems since Windows 2000. Each domain has a separate authentication process and space. Each domain may contain different users and different network assets and data objects.

Microsoft trust relationships fall into two categories: non-transitive and transitive. Non-transitive trusts only exist between two trust partners. Transitive trusts exist between two partners and all of their partner domains.

48
Q

Access Control Models

A

Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Non-Discretionary Access Control.

49
Q

Discretionary Access Control (DAC)

A

gives subjects full control of objects they have created or been given access to, including sharing the objects with other subjects. Subjects are empowered and control their data. Standard UNIX and Windows operating systems use DAC for file systems: subjects can grant other subjects access to their files, change their attributes, alter them, or delete them.

50
Q

Mandatory Access Control (MAC)

A

is system-enforced access control based on a subject’s clearance and an object’s labels. Subjects and Objects have clearances and labels, respectively, such as confidential, secret, and top secret. A subject may access an object only if the subject’s clearance is equal to or greater than the object’s label. Subjects cannot share objects with other subjects who lack the proper clearance, or “write down” objects to a lower classification level (such as from top secret to secret). MAC systems are usually focused on preserving the confidentiality of data.

51
Q

Non-Discretionary Access Control

A

AKA - Role-Based Access Control (RBAC) defines how information is accessed on a system based on the role of the subject.

52
Q

Rule-based access control system

A

uses a series of defined rules, restrictions, and filters for accessing objects within a system. The rules are in the form of “if/ then” statements. An example of a rule-based access control device is a proxy firewall that allows users to surf the Web with predefined approved content only

53
Q

What is the difference between password cracking and password guessing?

A

Password guessing attempts to log into the system; password cracking attempts to determine a password used to create a hash

54
Q

What authentication method exposes the password in clear text?

A

PAP

55
Q

What are the main differences between retina scans and iris scans?

A

Retina scans change depending on the person’s health; iris scans are stable

56
Q

What is the most important decision an organization needs to make when implementing RBAC?

A

The roles users have on the system need to be clearly defined

57
Q

What access control method weighs additional factors such as time of attempted access before granting access?

A

Context-dependent access control

58
Q

Within Kerberos, which part is the single point of failure?

A

The Key Distribution Center

59
Q

What protocol provides a common open protocol for interfacing and querying directory service information provided by network operating systems, using port 389 via TCP or UDP?

A

LDAP

60
Q

Server A trusts server B. Server B trusts Server C. Server A therefore trusts server C. What term describes this trust relationship?

A

Transitive Trust

61
Q

What technique would raise the False Accept Rate (FAR) and Lower the False Reject Rate (FRR) in a fingerprint scanning system?

A

Decrease the amount of minutiae that is verified

62
Q

Content-dependent access control

A

adds additional criteria beyond identification and authentication: the actual content the subject is attempting to access.

63
Q

Context-dependent access control

A

applies additional context before granting access. A commonly used context is time. After identification and authentication,

64
Q

In discretionary access environments, which of the following entities is authorized to grant information access to other people?

A

Data Owner

65
Q

Which of the following are additional access control objectives?

A

Reliability and utility

66
Q

Another type of access control is lattice-based access control. In this type of control a lattice model is applied. How is this type of access control concept applied?

A

The pair of elements is the subject and object, and the subject has an upper bound equal or higher than the upper bound of the object being accessed.

67
Q

What do you call a user interface that limits the functions that can be selected by a user?

A

Constrained user interfaces

68
Q

What is called a sequence of characters that is usually longer than the allotted number for a password?

A

passphrase

69
Q

Which type of password token involves time synchronization?

A

Synchronous dynamic password tokens

Synchronous dynamic password tokens generate a new unique password value at fixed time intervals, so the server and token need to be synchronized for the password to be accepted.

70
Q

Which of the following access control models requires security clearance for subjects?

A

Mandatory access control

71
Q

Because all the secret keys are held and authentication is performed on the Kerberos TGS and the authentication servers, these servers are vulnerable to:

A

both physical attacks and attacks from malicious code.

72
Q

In addition to the accuracy of the biometric systems, there are other factors that must also be considered:

A

These factors include the enrollment time, the throughput rate, and acceptability.

73
Q

These factors include the enrollment time, the throughput rate, and acceptability.

A

Preventive security controls

74
Q

Which biometric method analyzes the speed of signing (stroke), and the pressure the signer exerts to generate a signature?

A

Signature Dynamics