Identity and Access Management Flashcards

1
Q

NTFS file permissions

A
full control
modigy
read and execute
read
write
special permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

-List of information to handle how everyone is given access

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Federated Sytstem

A

System that is trusted by the domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Samba

A

Allows Linux machines to use Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

KDC

-Windows Domain Controller is known as KDC

A

Key Distribution Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PIV card

-Picture and Identification information

A

Personal Identity Verification card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Windows File Permissions

-moving files on same hard drive to a new location what happens to permissions?

A

Keeps permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Linux File Permissions

A

D RWX RWX RWX

  • Directory
  • Owner
  • Group
  • Everyone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multifactor Authentication

A

Using more than one authentication factor

ex: finger print and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Linux command for editing permissions

A

chmod
O= everyone (stands for other)
G= group
A= all 3 catergories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Kerberos

A

Authentication protocol used to authenticate to windows domain controller
-Uses port 88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NTFS folder permissions

A
full control
modigy
read and execute
list folder content
read
write
special permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PAP

  • Sends username and password in the clear
  • Not used very often anymore
A

Password Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Implicit Deny

A

Always denies unless told otherwise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AAA

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CHAP

  • Uses a hash value to authenticate
  • Sends the hash to whoever is trying to get authenticated as the challenge - they have to recreate the hash using the same shared key and send back as proof
A

Challenge-Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SAML

  • Used for web applications
  • Single Sign-On allows access between an identity provider and a service provider
A

Security Assertion Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Linux permissions (numbers = permissions)

A
0 = ---
1 = --x
2 = -w-
3 = -wx
4 = r--
5 = r-x
6 = rw-
7 = rwx
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

File system that doesn’t support windows permissions

A

Fat32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Linux command for changing owner

A

sudo chown

21
Q

Windows system for passwords and general management

-Usually for that particular local machine

A

Local Security Policy

22
Q

RBAC

  • Most common
  • Access to resources is defined by your role
A

Role-Based Access Control

23
Q

Windows File Permissions

-copying files from drive letter to another drive letter on the same hard drive what happens to permissions?

A

Loses permissions

24
Q

Rights and Privileges

A

Mostly used for system function access

25
Q

MAC

-Labels “top secret”

A

Mandatory Access Control

26
Q

TGT

-Shows that you’re authenticated to domain

A

Ticket Granting Ticket

27
Q

TACACS+

  • Decouples the authorization from the authentication
  • Uses TCP port 49
A

Terminal Access Controller Access-Control System Plus

28
Q

LDAP

  • Used to access other directories/resources
  • More of a language than authentication protocol
A

Lightweight Directory Access Protocol

-Uses TCP and UDP port 389

29
Q
RADIUS
-Used in wireless authentication
-Can use ports:
1812
1813
1645
1646
A

Remote Authentication Dial-In User Service

30
Q

RSA Key

A

Software/key that stores a secret code that changes every so often - “something you have”

31
Q

Authorization

A

What rights you have to the system once you’ve been authenticated

32
Q

CAC card

-Picture and Identification

A

Common Access Card

33
Q

Least Privilege

A

Always give the least amount of privilege to users for them to do their job

34
Q

RADIUS client

A

Gateway for server and user

35
Q

NTLM

  • Like CHAP but both ways
  • Client and server each challenge the other side with a hash value
A

NT Lan Manager

36
Q

HOTP

-fob creates single use code using key and counter

A

HMAC-based One-Time Password algorithm

37
Q

Identification

A

Proves who you are to the authenticating system

38
Q

Group Policy Objects Management

A

Found in Active Directory

Can be applied to domains/individual sites/groups

39
Q

What are the 5 Authentication Factors

A
  1. Something you know - password
  2. Something you have - smartcard/key fob
  3. Something about you - retinal scanners
  4. Something you do - rhythm of typing can be used
  5. Somewhere you are - geography/zip code getting gas
40
Q

RADIUS server

A

Holds or has access to passwords/usernames

41
Q

Authentication

A

Proving you have the rights to that system

ex: password

42
Q

Windows File Permissions

-copying files from drive to another drive what happens to permissions?

A

Loses permissions

43
Q

Linux command for changing password

A

sudo passwd

44
Q

Inheritance

A

When you give a folder permissions, anything created in that folder will have mirrored permissions with options greyed out

45
Q

Permissions

A

Usually handled in groups for organizations - more used for files and resources

46
Q

RADIUS supplicant

A

Person or system trying to get authenticated

47
Q

Captcha

A

Used on websites - wonky lettering or pictures you have to identify to prove you’re not a bot - “something you know”

48
Q

DAC

-Whoever created data defines access

A

Discretionary Access Control

49
Q

TOTP

-fob creates single use code using key and time of day

A

Time-based One-Time Password algorithm