Identity and Access Management Domain Flashcards

1
Q

The process of establishing confidence in user identities electronically presented to an information system

A

Electronic authentication (e-authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A non-contact, automatic identification technology that uses radio signals to identify, track, sort, and detect a variety of objects including people, vehicles, goods, and assets without the need for direct contact

A

Radio Frequency Identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Allows authorised security personnel to simultaneously manage and monitor multiple entry points from a single, centralized location

A

Physical Access Control Systems (PACS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system that manages passwords consistently across the enterprise

A

Password Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides the system with a way of uniquely identifying a particular user amongst all the users of that system

A

User ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Used to enter secured areas of a facility and are used in conjuction with a badge reader to read information stored on the badge

A

Access badges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A 48-bit number (typically represented in hexadecimal format) that is supposed to be globally unique

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protection mechanisms that limit users’ access to information and restrict their forms of access on the system to only what is appropriate for them

A

Logical access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Developing standard for authenticating network users. Kerberos offers two-key benefits;

1) It functions in a multi-vendor network
2) It does not transmit passwords over the network

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The process of collecting and verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who they claim to be, and establishing a reliable relationship

A

Identity Proofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud-based services that broker identity and access management functions to target systems on customers’ premises and/or in the cloud

A

Identity as a Service (IDaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An access control model that bases the access control authorizations on the roles (or functions) that the user is assigned within an organization

A

Role-Based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A version of SAML OASIS standard for exchanging authentication and authorization data between security domains

A

Security Assertion Markup Language 2.0 (SAML 2.0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Protects enterprise assets and provides a history of who gained access and when the access was granted

A

Facility access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A unified login experience (from the viewpoint of the end user) when accessing one or more systems

A

Single sign-On (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Involves the use of simply one of the three available factors solely in order to carry out the authentication process being requested

A

Single Factor authentication

17
Q

An access control model that is based on a list of predefined rules that determine what accesses should be granted

A

Rule-Based Access Control

18
Q

Ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity

A

Multi-Factor Authentication

19
Q

The process of defining the specific resources a user needs and determining the type of access to those resources the user may have

A

Authorization

20
Q

The process of verifying the identitiy of the user

A

Authentication

21
Q

Physical or electronic systems designed to control who, or what, has access to a network

A

Access Control Systems

22
Q

Systems that attempt to streamline the administration of user identity across multiple systems

A

Account Management Systems

23
Q

A hardware device that contains non-programmable logic and non-volatile storage dedicated to all cryptographic operations and protection of private keys

A

Cryptographic Device

24
Q

Access control that requires the system itself to manage access controls in accordance with the organization’s security policy

A

Mandatory Access Controls

25
Q

A local hardware encryption engine and secured storage for encryption keys

A

Trusted Platform Modules (TPM)