Identity and Access Management Flashcards

1
Q

Proves who I am to the authenticating system

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What rights do I have to the system once I have been authenticated

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

takes place by me proving that i have authorization to that system

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Authentication factors

A

Knowledge, possession, inherence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Something you know authentication factor

A

Knowledge (passwords, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

something you have authentication factor

A

possession (smart card, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

something about you authentication factor

A

inherence (biometrics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

inherited from a different trusted system

A

Federated trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

using two or more authentication factors

A

multi factor authentications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The things assigned to you that you can do

A

Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assigned at the system level

A

Rights/Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give your user or groups the least amount of privilege to their job done

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Labels authorization mode

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

owner of the data defines access

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access to resources is defined by a set of rules (Groups)

A

Role-based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A list of permissions attached to an object

A

Access Control lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Tool used to configure a security policy setting on the local device, on a domain joined device and on a domain controller

A

Local Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Collection of settings that define what a system will look like and how it will behave for a defined group of users

A

Group Policy Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three permissions that can be given on a Linux file system?

A

Read, Write, Execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the three groups that can be given rights in a linux file system?

A

Owner, Group, Everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What command is used to change the permissions in a Linux File system?

A

chmod

22
Q

What command is used to change the owner in a Linux File system?

A

chown

23
Q

What command is used to change the password of a user in a Linux File system?

A

passwd

24
Q

In a windows system, granted to users and groups on folders and files

A

NTFS Permissions

25
Q

Permissions given to a folder is also given to sub folders and files within the folder

A

Inheritance

26
Q

How can inheritance be turned off?

A

using the Deny checkbox

27
Q

Networking protocol that provides AAA management for users who connect and use a network service

A

Remote Authentication Dial-In User Service (RADIUS)

28
Q

What does the RADIUS server contain?

A

usernames and passwords

29
Q

In RADIUS, what is the gateway that separates what we are trying to authenticate to and the person trying to authenticate?

A

RADIUS client

30
Q

In RADIUS, what is the person or system trying to get authenticated called?

A

RADIUS supplicant

31
Q

What four ports can RADIUS use?

A

1812, 1812, 1645, 1646

32
Q

What is the downside to using RADIUS?

A

Doesn’t handle authorization

33
Q

What is the protocol developed by Cisco and released as an open standard in 1993??

A

Terminal Access Controller Access-Control System Plus (TACASC+)

34
Q

What does TACASC+ handle?

A

authentication, authorization, and accounting (AAA)

35
Q

what port does TACACS+ use?

A

49

36
Q

What is the oldest authentication method that sends username and password in the clear?

A

Password Authentication Protocol (PAP)

37
Q

Which authentication method has a key on both server and client, a challenge message, and sends hash along with challenge message over to the client?

A

Challenge-Handshake Authentication Protocol (CHAP)

38
Q

Which authentication method is used for two windows systems within a work group logging into each other? Also referred to “double CHAP”.

A

NT LAN Manager (NTLM)

39
Q

Which authentication method uses windows domain controllers?

A

Kerberos

40
Q

What port does Kerberos use?

A

Port 88

41
Q

What is used exclusively for authenticating for web applications?

A

Security Assertion Markup Language (SAML)

42
Q

Which authentication method is more of a structured language that allows one computer to go into someone else’s directory and query and udpate it?

A

Lightweight Directory Access Protocol (LDAP)

43
Q

What port does LDAP use?

A

TCP/UDP Port 389

44
Q

using Kerberos, what is the domain controller called?

A

Key distribution center

45
Q

What tool could you use to set up single sign on within a LAN?

A

Windows Active Directory

46
Q

What is the protocol that allows Linux users to use Active Directory

A

SAMBA

47
Q

What determines the number of times you can unsuccessfully attempt to log in before you are shut out of the system for a specified period?

A

account lockout threshold

48
Q

Where are the settings for passwords located?

A

Local Security Policy

49
Q

What relates to how long a password is active before it must be changed?

A

Maximum password age

50
Q

What determines how long the user will be locked out of the system before he can attempt to log on again?

A

Account lockout duration