IAM Solutions Flashcards

1
Q

Identity Access Management

A

Systems/processes used to manage information into an organization to ensure that right user has correct access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Account Provisioning

A

Process of creating and removing (deprovisioning) new users’ accounts, assigning permissions, and providing access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identity Proofing

A

Verify users’ identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Interoperability

A

Ability of different systems/devices to work together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multi-Factor Authentication (MFA)

A

Systems that require more than one form of authentication through a list of defined categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multi-Factor Authentication Knowledge Based

A

(password, PIN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multi-Factor Authentication Possession Based

A

(key fob, smart card, software token)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multi-Factor Authentication Inherence Based

A

(face scan, thumbprint)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multi-Factor Authentication Location Based

A

(IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Multi-Factor Authentication Behavior Based

A

Patterns such as keystrokes and mouse movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Single Factor Authentication

A

Uses one factor for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two-factor authentication

A

Uses two factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Password security

A

Measures the password’s ability to repel guessing/brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password managers

A

Store, generate, and autofill passwords for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Passwordless authentication

A

Improves security and usability than traditional methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password authentication types

A

(biometric, hardware tokens, one-time password, Magic Links, and Passkeys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hardware tokens

A

Physical devices like a security key that generates a short-duration login code

18
Q

Magic Link

A

Email link that automatically logs the user into a web site

19
Q

Password attack types

A

(Brute force, dictionary attack, password-spraying, and hybrid attacks)

20
Q

Dictionary attacks

A

Using a list of commonly used passwords and trying them all

21
Q

Password spraying

A

Form a brute force that involves trying a small number of commonly used passwords against a large number of usernames

22
Q

Hybrid attack

A

Blends brute and dictionary text by using common passes with variations such as adding numbers and special characters

23
Q

Single Sign-On (SSO)

A

Authentication process that allows a user to access multiple applications and websites by logging in only once using a single set of credentials

24
Q

Identity Provider (IDP)

A

System that (creates, manages, maintains) identity information for principals while providing authentication services to apps that use it within their network; Microsoft Entra

25
Lightweight Directory Access Protocol (LDAP)
Used to access and maintain distributed directory information services over an internet protocol in plain text
26
LDAPS
LDAP with support over (SSL, STLS) that both support encryption and data over transmission
27
Open Authorization (OAUTH)
Open standard for token-based authentication and authorization that allows a user's information to be used by third-party services without the user's password
28
Security Assertion Markup Language (SAML)
Standard for logging users into applications based on their sessions in another context
29
Federation
Processes that allows for the linking of users' identities across multiple independent security domains or organizations, allowing that user to use resources from those partners' domains; Using SAML or OAuth and OpenID; Example, user authenticated by Org A uses a service in Org B, vouched by Org A
30
Privilege Access Management (PAM)
Solution that helps organizations restrict and monitor privileged access within an IT environment
31
Just-IN-Time (JIT) Permissions
Security model where administrative access is granted only when needed for a specific period
32
Password vaulting
Store and manage passwords in a vault
33
Temporal accounts
Used to provide time-limited access to resources and automatically deleted/disabled
34
Mandatory Access Control (MAC)
Employ security labels to authorize user accounts to specific resources; Every single user and resources need a unique level
35
Discretionary Access Control (DAC)
Resource owners determine which users can access each resources
36
RBAC
Rule-based Access Control and Role-Based Access Control
37
Role-based Access Control
Enables admins to apply security policies to all users
38
Attribute-based access control (ABAC)
Uses object characteristics for access control decisions
39
Time-of-day Restrictions and Principles of Least Privilege
Prevention mechanisms and methodologies
40
Permission or Authorization Creep
Occurs when the user gains excessive rights during career progression
41
User Account Control (UAC)
Designed to ensure that actions requiring admin rights are authorized by the user