Identity and Access Management Flashcards

1
Q

This type of control enables data owners to dictate what subjects have access to the files and resources they own.

A. RBAC
B. MAC
C. DAC
D. RB-RBAC

A

DAC

Discretionary Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This type of control uses a security label system. Users have clearances, and resources have security labels that contain data classifications.

A. RBAC
B. MAC
C. DAC
D. RB-RBAC

A

MAC

Mandatory Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of control is network architecture?

A. Physical
B. Technical
C. Administrative
D. Management

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of control is auditing?

A. Physical
B. Technical
C. Administrative
D. Management

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of control is perimeter security?

A. Physical
B. Technical
C. Administrative
D. Management

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of control is security-awareness training?

A. Physical
B. Technical
C. Administrative
D. Management

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is a set of rules for encoding documents in machine-readable form to allow for interoperability between various web-based technologies.

A

XML

Extensible MArkup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a framework being developed for exchanging user, resource, and service provisioning information between cooperating organizations.

This markup allows for the integration and interoperation of service provisioning requests across various platforms.

A

SPML

Service Provisioning Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is both a declarative access control policy language and a processing model, describes how to interpret security policies.

SAML is just a way to send authentication data. It does not tell the receiving system how to interpret and use this authentication data. This does….

A

XACML

Extensible Access Control Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a word for a threshold value. If this value is exceeded, the activity is considered to be an event that is logged, investigated, or both.

A

Clipping level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following can provide SSO capabilities? (you can choose more than one)

A. LDAP
B. thin clients
C. Kerberos
D. SPML

A

B and C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of following is not a weakness of Kerberos?

A. There must be management of secret keys
B. Susceptible to password guessing
C. KDC is a single point of failure
D. Session and secret keys are locally stored.
E. None of the above.

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This phrase is used to describe when a user gains too much access rights and permission over time.

A

Authorization Creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The security analyst reports a problem with pharming. What should be hardened?

A. Firewall
B. DHCP
C. Email Server
D. DNS

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This allows for the automation of user management (account creation, amendments, revocation) and access entitlement configuration related to electronically published services across multiple provisioning systems.

A. SOAP
B. SAML
C. SOA
D. SPML

A

SPML

Service Provisioning Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This allows for the exchange of authentication and authorization data to be shared between security domains.

A. SOAP
B. SAML
C. SOA
D. SPML

A

SAML

Security Assertion Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This is a protocol specification for exchanging structured information in the implementation of web services and networks environments.

A. SOAP
B. SAML
C. SOA
D. SPML

A

SOAP

Simple Object Access Protocol

18
Q

These environments allow for a suite of interoperable services to be used within multiple, separate systems form several business domains.

A. SOAP
B. SAML
C. SOA
D. SPML

A

SOA

Service Oriented Architecture

19
Q

This is an open standard and protocol that allows third-party authentication of a user.

A

OpenID

20
Q

This is an open standard that allows a user to grant authority to some web resource, like a contacts database, to a third party.

A

OAuth

21
Q

Name two contactless smart card architectures.

A. SOAP
B. Combi
C. TEMPEST
D. Hybrid

A

B and D

22
Q

Which of the following is not a centralized administration access control technology.

A. RADIUS
B. TACACS++
C. Diameter
D. TACACS+

A

B

23
Q

This type of IDS matches patterns, similar to anti-virus software and can not identify brand new attacks.

A. Anomaly-Based
B. Rule-Based
C. Signature-Based
D. Pattern-Based

A

C

24
Q

This type of IDS is behavioral-based that learns the “normal” activities of an environment. It can detect new attacks but can be challenging to calibrate.

A. Anomaly-Based
B. Rule-Based
C. Signature-Based
D. Pattern-Based

A

A

25
Q

This IDS type uses IF/THEN programming within an expert system. Cannot detect new attacks.

A. Anomaly-Based
B. Rule-Based
C. Signature-Based
D. Pattern-Based

A

B

26
Q

This type of IDS has three sub-types: Statistical, Protocol, and Traffic. Also sometimes called heuristic-based.

A. Anomaly-Based
B. Rule-Based
C. Signature-Based
D. Pattern-Based

A

A

27
Q

How do you feed all network data to a NIDS in a switched environment?

A

Put the traffic on a span port to the NID device.

28
Q

In a RADIUS and TACACS+ implementation, a remote user is a client to an access server, and the access server is a client to the RADIUS/TACACS+ server. Which of the following is a security flaw of RADIUS vs. TACACS+ ?

A. RADIUS uses the AAA architecture, separating authentication, authorization, and auditing for more flexibility.
B. TACACS+ uses TCP.
C. RADIUS works over PPP connections.
D. RADIUS sends username, accounting, and authorization services in cleartext.

A

D

A. is wrong b/c TACACS+ uses the AAA architecture, separating authentication, authorization, and auditing for more flexibility.
B. Is wrong b/c TCP means less intelligent code needs to be written into TACACS+
C. Is not necessarily a security flaw, just a limit to functionality.

29
Q

Counter-based (aka event-based) is a type of __________ token-based OTP?

A. Synchronous
B. Asynchronous

A

A

30
Q

Time-based is a type of __________ token-based OTP?

A. Synchronous
B. Asynchronous

A

A

31
Q

A challenge/response mechanism is employed in ______________ OTP?

A. Synchronous
B. Asynchronous

A

B

32
Q

A one-time password (OTP) generated in software, which does not require a piece of hardware like a token device, is called a ____________ .

A

Soft Token

33
Q

This is a portable identity and its associated entitlements that can be used across business boundaries.

A

Federated Identity

34
Q

A _________ language is a way to structure text and data sets, and it dictates how these will be viewed and used. HTML is an example of it.

A

markup

35
Q

_________ is a universal and foundational standard that provides a structure for other independent markup languages to be built from and still allow for INTEROPERABILTY.

A

XML

36
Q

Which of the following is not a component of a SAML-based process?

A. Requester
B. Principle
C. Identity Provider
D. Service Provider

A

A.

Principle = User
Identity Provider = Your company
Service Provider = e.g. Google for gmail service

37
Q

In MAC implementations, the system makes access decisions by comparing the subject’s clearance and need-to-know level to the object’s what?

A. ACL
B. Identity Label
C. Security Label
D. MAC Label

A

C

aka sensitivity label

38
Q

In DAC implementations, the system compares the subject’s identity to the resource’s what?

A. ACL
B. Identity Label
C. Security Label
D. DAC Label

A

A

39
Q

If rights are being assigned implicitly in RBAC, they are assigned to a _______ and the user inherits those attributes.

A

role or group

40
Q

This specifies the access rights a certain subject possess pertaining to specific objects.

A. Access Control Matrix
B. Capability Table
C. ACL
D. Sensitivity Label

A

B

41
Q

Bound to an object and indicates what subjects can access it and what operations they can carry out.

A. Access Control Matrix
B. Capability Table
C. ACL
D. Sensitivity Label

A

C