Domain 5 Identity and Assess Mgt Flashcards

1
Q

Preventive Control

A

attempts to thwart or stop unwanted
or unauthorized activity from occurring

fences, locks, biometrics, mantraps, lighting, alarm systems, separation-of-duties policies, job rotation policies, data classification, penetration testing, access control methods,
encryption, auditing, the presence of security cameras or closed-circuit television (CCTV),
smartcards, callback procedures, security policies, security awareness training, antivirus
software, firewalls, and intrusion prevention systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Detective Control

A

A detective control attempts to discover or detect unwanted or unauthorized activity. Detective controls operate after the fact and can discover the activity
only after it has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Corrective Control

A

A corrective control modifies the environment to return

systems to normal after an unwanted or unauthorized activity has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Deterrent Control

A

A deterrent access control attempts to discourage security policy violations. Deterrent and preventive controls are similar, but deterrent controls often
depend on individuals deciding not to take an unwanted action. In contrast, a preventive
control blocks the action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recovery Access Control

A

A recovery access control attempts to repair or restore
resources, functions, and capabilities after a security policy violation. Recovery controls are an extension of corrective controls but have more advanced or complex abilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Directive Control

A

A directive access control attempts to direct, confi ne, or control the actions of subjects to force or encourage compliance with security policies
Examples of directive access controls include security policy requirements or criteria, posted notifi cations, escape route exit signs, monitoring, supervision, and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Compensating Control

A

A compensating access control provides an alternative

when it isn’t possible to use a primary control, or when necessary to increase the effectiveness of a primary control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Administrative Control

A

Administrative access controls are the policies and procedures defined by an organization’s security policy and other regulations or requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Logical/Technical Controls

A

Logical access controls (also known as technical access controls) are the hardware or software mechanisms used to manage access and to provide
protection for resources and systems. As the name implies, they use technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical Control

A

Physical access controls are items you can physically touch. They include physical mechanisms deployed to prevent, monitor, or detect direct contact with systems or areas within a facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Synchronous Dynamic Password Tokens

A

Hardware tokens that create synchronous

dynamic passwords are time-based and synchronized with an authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asynchronous Dynamic Password Tokens

A

An asynchronous dynamic password does not
use a clock. Instead, the hardware token generates passwords based on an algorithm and an
incrementing counter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HOTP

A

HMAC based one time password
Creates HOTP of 6 - 8 numbers
similar to Asynchronous dynamic token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TOTP

A

Time-based OTP. Similar to Synchronous Dynamic token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSO

A

Single Sign on. Part of Federated Identity Mgt.
authenticated once on a system and to access multiple resources without authenticating
again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

LDAP

A

Used by Active Directory to look up subjects and objects

Also used by PKI to manage digital certificate

17
Q

Kerberos

A

single sign-on solution for users and provides protection for logon credentials.

Relies on AES - Symmetric encryption

Uses KDC - key distribution center - trusted third party that provides authentication. All clients and servers

18
Q

SAML

A

Security Assertion Markup Language (SAML) is
an XML-based language that is commonly used to exchange authentication and authorization (AA) information between federated organizations. It is often used to provide SSO capabilities for browser access.