Identity and Access Management Flashcards
This type of control enables data owners to dictate what subjects have access to the files and resources they own.
A. RBAC
B. MAC
C. DAC
D. RB-RBAC
DAC
Discretionary Access Control
This type of control uses a security label system. Users have clearances, and resources have security labels that contain data classifications.
A. RBAC
B. MAC
C. DAC
D. RB-RBAC
MAC
Mandatory Access Control
What type of control is network architecture?
A. Physical
B. Technical
C. Administrative
D. Management
B
What type of control is auditing?
A. Physical
B. Technical
C. Administrative
D. Management
B
What type of control is perimeter security?
A. Physical
B. Technical
C. Administrative
D. Management
A
What type of control is security-awareness training?
A. Physical
B. Technical
C. Administrative
D. Management
C
This is a set of rules for encoding documents in machine-readable form to allow for interoperability between various web-based technologies.
XML
Extensible MArkup Language
This is a framework being developed for exchanging user, resource, and service provisioning information between cooperating organizations.
This markup allows for the integration and interoperation of service provisioning requests across various platforms.
SPML
Service Provisioning Markup Language
This is both a declarative access control policy language and a processing model, describes how to interpret security policies.
SAML is just a way to send authentication data. It does not tell the receiving system how to interpret and use this authentication data. This does….
XACML
Extensible Access Control Markup Language
This is a word for a threshold value. If this value is exceeded, the activity is considered to be an event that is logged, investigated, or both.
Clipping level
Which of the following can provide SSO capabilities? (you can choose more than one)
A. LDAP
B. thin clients
C. Kerberos
D. SPML
B and C
Which of following is not a weakness of Kerberos?
A. There must be management of secret keys
B. Susceptible to password guessing
C. KDC is a single point of failure
D. Session and secret keys are locally stored.
E. None of the above.
E
This phrase is used to describe when a user gains too much access rights and permission over time.
Authorization Creep
The security analyst reports a problem with pharming. What should be hardened?
A. Firewall
B. DHCP
C. Email Server
D. DNS
D
This allows for the automation of user management (account creation, amendments, revocation) and access entitlement configuration related to electronically published services across multiple provisioning systems.
A. SOAP
B. SAML
C. SOA
D. SPML
SPML
Service Provisioning Markup Language
This allows for the exchange of authentication and authorization data to be shared between security domains.
A. SOAP
B. SAML
C. SOA
D. SPML
SAML
Security Assertion Markup Language