Identity and Access Management (IAM) Flashcards
This domain represents 13 percent of the exam. Identity and access management (IAM) is often the first — and sometimes the only — line of defense between adversaries and sensitive information. With ubiquitous mobile computing and anywhere, anytime access to applications and data, many security practitioners now refer to identity as “the new perimeter.”
Q. 1 An access control system that grants access to information based on the identity of the user is known as what? Drag and drop the correct answer(s) from top to bottom.
Role-based access control
Mandatory access control
Clearance-based access control
Identity-based access control
Identity-based access control
[Identity and Access Management] Identity-based access control is used to grant access to information based on the identity of the person requesting access.
Q. 2 An access control model in which the system determines the access policy is known as what? Drag and drop the correct answer(s) from top to bottom.
Discretionary access control
Mandatory access control
Administrative access control
Role-based access control
Mandatory access control
Role-based access control
[Identity and Access Management] Mandatory access controls are determined by the system, based on the user’s clearance level and the classification of the information.
Q. 3 In Kerberos, a dynamic key that is generated when needed, shared between two principals, then destroyed when it is no longer needed, is known as a
Public key Shared key Secret key Session key
Session key
[Security Engineering] Public, shared, and secret keys are general terms used to describe symmetric and asymmetric cryptosystems. A session key is a specific type of dynamic key that is generated in Kerberos, shared between systems participating in a Kerberos session, then destroyed when the session ends or the key expires.
Q. 4 Which of the following are examples of physical access controls? Drag and drop the correct answer(s) from top to bottom.
Locked doors Security guards Audits Firewalls Surveillance cameras
Locked doors
Security guards
Surveillance cameras
[Identity and Access Management] Security guards, locked doors, and surveillance cameras are physical access controls. Firewalls are technical controls. Audits are administrative controls.
Q. 5 An access control system that gives the user some control over who has access to information is known as
Identity-based access control Discretionary access control Role-based access control Mandatory access control
Discretionary access control
[Identity and Access Management] Discretionary access controls permit access to information based on certain user-defined criteria.
Q. 6 Which of the following are examples of administrative controls? Drag and drop the correct answer(s) from top to bottom.
Mantraps Assessments Security guards Audits Procedures Supervision
Assessments
Audits
Procedures
Supervision
[Identity and Access Management] Supervision, audits, procedures, and assessments are administrative controls. Security guards and mantraps are physical controls.
Q. 7 Fingerprint, retinal scan, and palm scans are examples of
Biometric authentication Physical controls Type 2 authentication Multi-factor authentication
Biometric authentication
[Identity and Access Management] Fingerprints, retina patterns, and palm prints are physical characteristics that can be used for biometric authentication.
Q. 8 In an access management life cycle, all of the following activities are considered detective controls for subject access EXCEPT:
Password configuration review Access activity review Entitlement review Access request review
Password configuration review
[Identity and Access Management] Reviewing password configuration is a detective control, but it is not part of the access management lifecycle.
Q. 9 Tokens, smart cards, and ATM cards used in authentication are examples of
Logical controls Identifiers Something you have Type 3 authentication
Something you have
[Identity and Access Management] Tokens, smart cards, and ATM cards are examples of “something you have” for authentication.
Q. 10 Which of the following diagrams correctly depicts the Crossover Error Rate?
- CER shaded in middle
- CER with down arrow no shade
- CER to the far right shaded
- CER to far ;eft shaded
- CER with down arrow no shade
[Identity and Access Management] The CER is the point at which the sensitivity (False Reject Rate, or FRR) and errors (False Accept Rate, or FAR) in a biometric authentication system intersect (are equal).
Q. 11 Which of the following are preventive controls? Drag and drop the correct answer(s) from top to bottom.
Listening devices
Audits
Fences
Smart cards
Fences
Smart cards
[Identity and Access Management] Smart cards, fences, and guard dogs are preventive controls. Audits and listening devices are detective controls.
Q. 12 Which of the following are detective controls? Drag and drop the correct answer(s) from top to bottom.
Audits Background checks Listening devices Fences Video surveillance
Audits
Background checks
Listening devices
Video surveillance
[Identity and Access Management] Video surveillance, listening devices, audits, and background checks are detective controls. Fences are preventive or physical controls.
Q. 13 What does TACACS stand for?
Technical Authentication Center Access Control Service Terminal Access Controller Authentication Control Service Technical Assistance Center Access Control System Terminal Access Controller Access Control System
Terminal Access Controller Access Control System
[Communication and Network Security] TACACS is an authentication protocol. It stands for Terminal Access Controller Access Control System.
Q. 14 Which of the following is NOT a weakness in Kerberos?
The user’s secret key is transmitted over the network Kerberos is vulnerable to replay attacks The TGS and AS servers are vulnerable to attack The user’s secret key is temporarily stored on the client system
The user’s secret key is transmitted over the network
[Identity and Access Management] The user’s secret key never is transmitted over the network in Kerberos.
Q. 15 CHAP is used for
Centralized access control Encrypting RADIUS authentication Ciphering RADIUS authentication Creating one-time passwords
Centralized access control
[Communication and Network Security] CHAP is a protocol used for centralized access control.