Domain 5: Identity and Access Management (Controlling Access and Managing Identity) Flashcards

1
Q

Password cracking

A

refers to an offline technique in which the attacker has gained access to the password hashes or database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Clipping levels

A

Clipping levels can help to differentiate the attacks from noise, however they can also cause false negatives if the attackers can glean the threshold beneath which they must operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A hybrid attack

A

prepends, or changes characters in words from a dictionary before hashing, to attempt the fastest crack of complex passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Synchronous dynamic tokens

A

use time or counters to synchronize a displayed token code with the code expected by the authentication server: the codes are synchronized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

False Reject Rate (FRR)

A

A false rejection occurs when an authorized subject is rejected by the biometric system as unauthorized. False rejections are also called a Type I error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

False Accept Rate (FAR)

A

A false acceptance occurs when an unauthorized subject is accepted as valid.Type II error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SAML

A

SAML is an XML-based framework for exchanging security information, including authentication data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

he primary weakness of Kerberos is that..

A

the KDC stores the keys of all principals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The KDC and TGS are also

A

single points of failure:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SESAME stands for Secure European System for Applications in a Multi-vendor Environment, a single sign-on system that supports heterogeneous environments

A

It addresses one of the biggest weaknesses in Kerberos: the plaintext storage of symmetric keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Password Authentication Protocol (PAP)

A

and is referred to as being, “not a strong authentication method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The advantage of using CHAP over PAP

A

he additional security provided by the shared secret used during the challenge and response: a sniffer that views the entire challenge/response process will not be able to determine the shared secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Discretionary Access Control (DAC)

A

gives subjects full control of objects they have created or been given access to, including sharing the objects with other subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mandatory Access Control (MAC)

A

is system-enforced access control based on a subject’s clearance and an object’s labels. Subjects and Objects have clearances and labels, respectively, such as confidential, secret, and top secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Role-Based Access Control (RBAC)

A

defines how information is accessed on a system based on the role of the subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Task-based access control

A

non-discretionary access control model, related to RBAC. Task-based access control is based on the tasks each subject must perform, such as writing prescriptions, or restoring data from a backup tape, or opening a help desk ticket. It attempts to solve the same problem that RBAC solves, focusing on specific tasks, instead of roles.

17
Q

Content-dependent access control

A

adds additional criteria beyond identification and authentication:

18
Q

Context-dependent access control

A

applies additional context before granting access. A commonly used context is time. After identification and authentication, a help desk worker who works Monday–Friday from 9 AM to 5 PM will be granted access at noon on a Tuesday