Domain 5 part 2 Flashcards

1
Q

Occurs as individuals users gain more access to more systems. Can happen intentionally (SSO) and unintentionally (because users often gain new entitlements (access rights)as they take on roles or duties.

A

Access aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Users gain more entitlements without shedding the old ones

A

Authorization creeping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Need to share common information Also refers to the policies, processes, and tech that establish user identities and enforce rules about access to digital resources.

A

Federated Identity Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Contains a sample of the biometric factor used for comparison during authentication.

A

reference template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Process that issues service tickets

A

TGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Parties that are authencticating

A

principal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Equivalant of MS domain

A

Realm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Process the initial request

A

Authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Equivalent of a domain controller

A

KDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MAC defines subjects as —- and objects as ——

A

active and passive entities upon which subjects act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access protocol that may be used for authentication wherein X500 tree is present

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Proposed successor to a very popular prot that uses TCP 3868 and encrypts authorization info. Provides better password protection by allowing a 2-factor strong authentication. Uses port 49 TCP bi-directional

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

cisco-based prot runs over TCP 49 bi-directional. Requires users to send an ID and static password for authentication. Using reusable password is vulnerability

A

TACACS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ticket based authentication proto

A

kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Generic term for centrally controlled authentication to multiple disparate systems

A

SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AAA proto runs over UPD 1812 and encrypts inbound info but not all of the authorization info. Authenticates a subject’s credentials against an authentication db. Authorizes users by allowing specific users to access specific data objects.

A

Radius

17
Q

Concerned about certificates. Authorization, Authentication, and accounting. proto runs over UPD 1812 and encrypts inbound info but not all of the authorization info. Authenticates a subject’s credentials against an authentication db. Authorizes users by allowing specific users to access specific data objects.

A

Radius

18
Q

Adds to kerberos. Scaliablity of public key systems, better manageabilitiy and audit and delegation. Adds public key assymmetric encryption. Addresses a big weakness in successor which is plaintext storage of symmetric keys

A

SESAME

19
Q

Adds to Kerberos. Scalability of public key systems, better manageability and audit and delegation. Adds public key asymmetric encryption. Addresses a big weakness in successor which is plaintext storage of symmetric keys

A

SESAME