Identity and Access Management Flashcards

1
Q

Determines what users can do with contents based on his credentials.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Keep a historical record of what users do to shared resources.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Means that the organization trusts another entity simply because they are trusted by someone else.

A

Transitive Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system that involves the use of a common authentication system and credentials database that multiple entities use and share.

A

Federated system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which access control applies to highly secure environnments, where a user is granted access to a system or data based upon his security level ?

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which access control provides access based on which user has created or owns an object ?

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which access control uses predefined roles to define access ?

A

Role-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which access control grantes access based upon predefined rules that may apply to users or groups of users and also more advanced firewalls ?

A

Rule-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ typically are generated by tokens or mobile devices to facilitate multifactor authentication

A

OTPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rate of errros from incorrectly rejecting authorized users :

A

FRR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rate of errors from incorrectly authenticating unauthorized users :

A

FAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Point of which the system must be tuned to reduce FRR and FAR :

A

Crossover error rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A storage chip to a stantard credit-card-sized plastic card creates a :

A

Smart Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type of account that sits between a user account and an admin/root account :

A

Privileged Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Term used when users privileges are not reviwed on periodic basis and users move around within the organization retaining privileges even when they no longer need them

A

Privilege Creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Form of auditing that involves examining audit rails, such as logs and other documentation, to ensure accountability for actions any user performs.

A

Continuous Monitoring

17
Q

Microsoft Windows Active Directory is an example of a _____ accounts and credentials database.

A

Centralized

18
Q

Oldest non secure authentication protocol used to pass user names and passwords to a central authentication server.

A

PAP

19
Q

Authentication protocol that relies on challenge and response messages and hashed passwords, as do other modern protocols. Ensures that passwords or user credentials are never sent over the network in clear text.

A

CHAP

20
Q

Protocol that provides AAA services, uses ports 1812 and 1813

A

Radius

21
Q

Authentication protocol Ciso-designed encrypts all traffic between all connection points, most used on network devices.

A

TACACS+

22
Q

Default authentication protocol for Windows Domains, uses authentication tickets and timestamps to help prevent replay attacks.

A

Kerberos