Identity, Access, and Accounts Flashcards

1
Q

Which of the following is an account you might use to run processes that do not require human intervention to start or stop?

Guest account

Process account

Service account

A

Service account

Service accounts are used to run processes that do not require human intervention to start, stop, or administer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A friend of yours who works in the IT department of a bank tells you that tellers are allowed to log in to their terminals only from 9 A.M. to 5 P.M., Monday through Saturday. What is this restriction an example of?

User auditing

Least privilege

Time-of-day restrictions

A

Time-of-day restrictions

Time-of-day restrictions are often used to limit the hours during which a user is allowed to log into or access a system. This helps prevent unauthorized access outside that user’s normal working hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the process of ascribing a computer ID to a specific user known as?

Validation

Authorization

Identification

A

Identification

Identification is the process of ascribing a computer ID to a specific user, computer, network device, or computer process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are working with a group to develop a new multifactor authentication system for your organization. Which of the following is not a valid category of authentication factors you might use?

Something you know

Something you see

Something you are

A

Something you see

Something you see is not one of the categories of authentication factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your organization is revamping its account management policies and you’ve been asked to clarify the difference between account disablement and account lockout. Which of the following statements best describes that difference?

Account disablement removes the user and all their data files; account lockout does not.

Account lockout typically only affects the ability to log in; account disablement removes all privileges.

Account lockout is permanent; account disablement is easily reversible.

A

Account lockout typically only affects the ability to log in; account disablement removes all privileges.

Account disablement is a step down from removing an account completely. While the account (and associated data files) still exist on the system, the account itself is disabled and has no privileges to access the system. Account lockout typically only affects logon privileges. Performing a temporary account lockout is a common approach to thwarting brute force password-guessing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following would most likely be the hardest password to crack?

An eight-character password based on a common dictionary word

A six-character password using only uppercase letters

A seven-character password using a completely random mix of letters, symbols, and numbers

A

A seven-character password using a completely random mix of letters, symbols, and numbers

Of the examples, C would be the most difficult to crack because it is random and is composed of letters, symbols, and numbers—a much larger character set to brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are accounts with greater than “normal” user access called?

Privileged accounts

System accounts

Superuser accounts

A

Privileged accounts

Privileged accounts are any accounts with greater than normal user access. Privileged accounts are typically root- or admin-level accounts and represent risk in that they are unlimited in their powers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You’ve been tasked to make sure every account on your mail server belongs to a valid, active employee. What is this process often called?

Recertification

Privilege auditing

Password cracking

A

Recertification

Recertification is the process of ensuring users are still employed and still require accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In a meeting discussing account management, one of your colleagues suggests you manage access control using collections of users rather than on a user-by-user basis. Your colleague is suggesting you use which type of access control?

Least privilege access control

Location-based access control

Group-based access control

A

Group-based access control

Group-based access control manages access control using groups of users rather than user by user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When a user no longer needs or is no longer authorized to use a system, which of the following should occur?

Account recovery

Account deletion

Account reset

A

Account deletion

Account disablement should occur when a user no longer has authorized use privileges on the system. Account deletion can mess with permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your organization trusts authentication of accounts from a partner organization and your partner organization trusts authentication from your organization. What is this relationship known as specifically?

Two-way trust relationship

Transition trust relationship

Authentication validation relationship

A

Two-way trust relationship

When two domains trust each other, this is known as a two-way trust relationship. In this case, your organization trusts the partner organization and they trust your organization in return. An extended trust is a nonsense distractor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following defines policies, protocols, and practices to manage identities across systems and organizations?

Transitive trust

Single sign-on

Identity federation

A

Identity federation

Federation, or identity federation, defines policies, protocols, and practices to manage identities across systems and organizations. Federation’s ultimate goal is to allow users to seamlessly access data or systems across domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following would not be considered “something you are” when discussing authentication factors?

Fingerprints

Voice

PIN code

A

PIN code

The authentication factor category “something you are” specifically refers to biometrics. These are uniquely identifying characteristics associated with individuals that typically do not change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In which of the following scenarios might it be acceptable to use a shared account?

On a server maintained by different personnel

On a publicly accessible PC running in kiosk mode

If the account is used only to administer e-mail accounts

A

On a publicly accessible PC running in kiosk mode

In general, shared accounts should be avoided when possible, but in situations where creating individual accounts is neither practical nor feasible and tracking user activity is not critical, shared accounts can be the solution. A publicly accessible PC running in kiosk mode is a good use of a shared account, as you wouldn’t be able to issue individual accounts to each person who uses the kiosk and tracking specific user activity is not critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The processes of adding a person to a project or team and removing a person from a project or team are known as:

Account creation and account disablement

Intake and outflow

Onboarding and offboarding

A

Onboarding and offboarding

Onboarding and offboarding refer to the processes of adding personnel to a project or team and removing them from a project or team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly