Exam 3 Flashcards

1
Q

Identification

A

Users, assigning a unique identifier to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

Process of associating user/name with other identifier (making sure is legit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

Associating user with objects and data they’re allowed to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Methods for authentication

A

Something the user should KNOW, HAS, IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multi factor-authentication

A

When more than one unique identifier is required by system to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Role-based authorization

A

Role-based access control to restrict network access by assigning individual specific roles that have predefined criteria, for what can/can’t be accessed to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Roles

A

Predefined permission users assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Permission

A

Right and privalage user has once assigned to a role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Administration role

A

Highest role in the hierarchy, has permission for all objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Principle of least privileged

A

Users should be assigned only necessary privileges to do their job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provisioning

A

process of assigning access to the users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

De-provisioning

A

Process of remaining access when users change jobs or leave organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access Creep

A

Additional roles are assigned to users that are needed temporarily, but not removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User Access reviews

A

Compare user job responsibilities with roles assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dormant access review

A

Compare access logs to user permissions to identify permissions that have not been used, and may need to be removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dormant user review

A

Compare access logs to users, identify users that have not access the systems and may need to be reviewed.

17
Q

Data Center

A

Data center is the physical location where servers, networks appliances and other hardware to make core IT infrastructure is stored.

18
Q

SOC 2 audit

A

Covers security, availability, processing integrity, or privacy for the cloud provider is required. Used when data center is outsourced.