Identity and Access Management Flashcards

1
Q

What method of access control is best suited for environments with a high rate of employee turnover?

MAC

DAC

RBAC

A

RBAC

Role-based access control (RBAC) is best suited for environments with a high rate of employee turnover, because access is defined against static job descriptions rather than transitive user accounts (DAC and ACL) or assigned clearances (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What mechanism is used to support the exchange of authentication and authorization details between systems, services, and devices?

Biometric

Two-factor authentication

SAML

A

SAML

SAML is an open standard data format based on XML for the purpose of supporting the exchange of authentication and authorization details between systems, services, and devices. A biometric is an authentication factor, not a means of exchanging authentication information. Two-factor authentication is the use of two authentication factors. LDAP is a protocol used by directory services and is not directly related to authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which is the strongest form of password?

More than eight characters

One-time use

Static

A

One-time use

A one-time password is always the strongest form of password. A static password is always the weakest form of password. Passwords with more than eight characters and those that use different types of keyboard characters are usually strong, but these factors alone are unable to indicate their strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following technologies can be used to add an additional layer of protection between a directory services–based network and remote clients?

SMTP

RADIUS

PGP

A

RADIUS

RADIUS is a centralized authentication solution that adds an additional layer of security between a network and remote clients. SMTP is the email-forwarding protocol used on the Internet and intranets. PGP is a security solution for email. VLANs are created by switches to logically divide a network into subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is not a benefit of single sign-on?

The ability to browse multiple systems

Fewer usernames and passwords to memorize

More granular access control

A

More granular access control

Single sign-on doesn’t address access control and therefore doesn’t provide granular or nongranular access control. Single sign-on provides the benefits of the ability to browse multiple systems, fewer credentials to memorize, and the use of stronger passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Federation is a means to accomplish ________.

Accountability logging

ACL verification

Single sign-on

A

Single sign-on

Federation or federated identity is a means of linking a subject’s accounts from several sites, services, or entities in a single account. Thus it is a means to accomplish single sign-on. Accountability logging is used to relate digital activities to humans. ACL verification is a means to verify that correct permissions are assigned to subjects. Trusted OS hardening is the removal of unneeded components and securing the remaining elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You have been tasked with installing new kiosk systems for use in the retail area of your company’s store. The company elected to use standard equipment and an open-source Linux operating system. You are concerned that everyone will know the default password for the root account. What aspect of the kiosk should be adjusted to prevent unauthorized entities from being able to make system changes?

Authorization

Accounting

Authentication

A

Authentication

Since the open-source Linux system likely has a default root password, changing the default password to something unique will have the effect of preventing unauthorized entities from making system changes. Passwords are part of the authentication system. Authorization is access control or the ability to interact with resource objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your company has several shifts of workers. Overtime and changing shifts is prohibited due to the nature of the data and the requirements of the contract. To ensure that workers are able to log into the IT system only during their assigned shifts, you should implement what type of control?

Multifactor authentication

Time-of-day restrictions

Location restrictions

A

Time-of-day restrictions

Time-of-day restrictions are used to limit or restrict what time of day, and often what day of the week, a specific user account can log on to the network or a specific system can be accessed by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your company has recently purchased Cisco networking equipment. When you are setting up to allow remote access, what means of AAA service is now available to your organization?

RADIUS

X.500

TACACS+

A

TACACS+

TACACS+ is a Cisco proprietary AAA service that is available only when using Cisco hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your organization has recently decided to allow some employees to work from home two days a week. While configuring the network to allow for remote access, you realize the risk this poses to the organization’s infrastructure. What mechanism can be implemented to provide an additional barrier against remote access abuse?

Kerberos

Single sign-on

RADIUS

A

RADIUS

RADIUS is an AAA server that can be used as an additional security barrier between external connections and the private network. A remote access–focused AAA service protects the internal domain controllers from abuse caused by remote connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are developing a smart app that will control a new IoT device that automates blinking light fixtures in time with the beat of music. You want to make using the device as simple as possible, so you want to adopt an authentication technique that is seamless for the user. Which technology should you integrate into your app and device?

OpenID Connect

Shibboleth

A secure token

A

OpenID Connect

OpenID Connect is an Internet-based single sign-on solution. It operates over the OAuth protocol (OAuth is an open standard for authentication and access delegation [federation]) and can be used in relation to web services as well as smart-device apps. The purpose or goal of OpenID Connect is to simplify the process by which applications are able to identify and verify users. Shibboleth is optimized for websites, not for devices and apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are effective permissions calculated?

Count the number of allows, subtract the number of denials

Accumulate allows, remove denials

Look at the user’s clearance level

A

Accumulate allows, remove denials

Effective permissions are calculated by accumulating all allows or grants of access to a resource, and then subtracting or removing any denials to that resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What form of authorization is based on a scheme of characteristics related to the user, the object, the system, the application, the network, the service, time of day, or even other subjective environmental concerns?

RBAC

DAC

ABAC

A

ABAC

Attribute-based access control (ABAC) is a mechanism for assigning access and privileges to resources through a scheme of attributes or characteristics. The attributes can be related to the user, the object, the system, the application, the network, the service, the time of day, or even other subjective environmental concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your organization wants to integrate a biometric factor into the existing multifactor authentication system. To ensure alignment with company priorities, what tool should be used in selecting which type or form of biometric to use?

CER comparison

OAuth verifier

Zephyr analysis chart

A

Zephyr analysis chart

When an organization decides to implement a biometric factor, it is important to evaluate the available options in order to select a biometric solution that is most in line with the organization’s security priorities. One method to accomplish this is to consult a Zephyr analysis chart. This type of chart presents the relative strengths and weaknesses of various characteristics of biometric factor options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of biometric error increases as the sensitivity of the device increases?

FAR

FRR

CER

A

FRR

FRR (false rejection rate) errors increase with sensitivity, whereas FAR (false acceptance rate) errors decrease with an increase in sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are installing a new network service application. The application requires a variety of permissions on several resources and even a few advanced user rights in order to operate properly. Which type of account should be created for this application to operate under?

Service

User

Privileged

A

Service

A service account is a user account that is used to control the access and capabilities of an application. Through the use of a service account, an application can be granted specific authorization related to its function and data access needs

17
Q

Failing to perform regular permissions auditing can result in a violation of what security concept?

Implicit deny

Security by obscurity

Least privilege

A

Least privilege

Failing to regularly audit permissions can result in users gaining more access over time that is not required by their current work responsibilities. This situation is a violation of the principle of least privilege

18
Q

What type of access management can involve restrictions based on MAC address, IP address, OS version, patch level, and/or subnet in addition to logical or geographical position?

Geography-based access control

Logical access control

Location-based access control

A

Location-based access control

Location-based access control is a means of authorization that grants or denies resource access based on where the subject is located. This might be based on whether the network connection is local wired, local wireless, or remote. Location-based policies can also grant or deny access based on MAC address, IP address, OS version, patch level, and/or subnet in addition to logical or geographical location

19
Q

Which of the following is a recommended basis for reliable password complexity?

Minimum of eight characters; include representations of at least three of the four character types

Allow for a maximum of three failed logon attempts before locking the account for 15 minutes

Require that each administrator have a normal user account in addition to a privileged account

A

Minimum of eight characters; include representations of at least three of the four character types

Password complexity sets the rules regarding password content, which should be a minimum of eight characters (although 12–16 would be much better) and include representations of at least three of the four character types (uppercase, lowercase, numbers, and symbols)