Identity and Access Management Solutions Flashcards

1
Q

A security process that provides identification, authentication, and authorization
mechanisms for users, computers, and other entities to work with organizational
assets like networks, operating systems, and applications

A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Support the identities of various assets by defining the resources an asset has
permission to access based on the function the asset fulfills

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A policy document that promotes strong passwords by specifying a minimum
password length, requiring complex passwords, requiring periodic password
changes, and placing limits on reuse of passwords

A

Password Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software used to generate a pseudorandom passphrase for each website a user
needs to log-on

A

Password Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asks the user for information that only they should know, such as their first
school, first model of car, or their first pet’s name

A

Challenge Questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Users provides a secondary communication channel like another email address or
cellphone number to receive a one-time code to verify their identify when
resetting a password

A

Two-step Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An authentication technology that enables a user to authenticate once and
receive authorizations for multiple services

A

Single Sign-On (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An authentication scheme that requires the user to present at least two different
factors as credentials, from something you know, something you have, something
you are, something you do, and somewhere you are

A

Multifactor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The practice of issuing, updating, and revoking digital certificates

A

Certificate Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Sysinternals utility that allows you to verify root certificates in the local store
against Microsoft’s master trust list

A

sigcheck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A library of software functions supporting the SSL/TLS protocol

A

OpenSSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Windows utility that allows you to display certification authority (CA)
configuration information, configure Certificate Services, backup and restore CA
components, and verify certificates, key pairs, and certificate chains
▪ Installing, updating, and validating trusted root certificates
▪ Deploying, updating, and revoking subject certificates
▪ Preventing use of self-signed certificates
▪ SSH key management

A

certutil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A process that provides a shared login capability across multiple systems and
enterprises

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Creating an account and giving the user authorization to a particular role,
application, or file share

A

Provisioning and Deprovisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An account is configured by an administrator on the service provider’s
site

A

Manual Provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Users are enrolled with the service provider without intervention

A

Automatic Provisioning

17
Q

The use of authentication and authorization mechanisms to provide an
administrator with centralized or decentralized control of user and group rolebased privilege management

A

Privilege Management

18
Q

Access Control Types

A

o Discretionary Access Control (DAC)
o Mandatory Access Control (MAC)
o Role-Based Access Control (RBAC)
o Attribute-Based Access Control (ABAC)

19
Q

Access control model where each resource is protected by an Access Control List
(ACL) managed by the resource’s owner (or owners)

A

Discretionary Access Control (DAC)

20
Q

Access control model where resources are protected by inflexible, system defined
rules where every resources (object) and user (subject) is allocated a clearance
level (or label)
SELinux provides a method for implementing MAC

A

Mandatory Access Control (MAC)

21
Q

An access control model where resources are protected by ACLs that are
managed by administrators and that provide user permissions based on job
functions
RBAC can be partially implemented in Windows through the concept of group
accounts

A

Role-Base Access Control (RBAC)

22
Q

An access control technique that evaluates a set of attributes that each subject
possesses to determine if access should be granted

A

Attribute-Based Access Control (ABAC)

23
Q

IAM auditing is necessary to detect compromise of a legitimate account, rogue
account use, and insider threat

A

IAM Auditing

24
Q

A log of all file access and authentications within network-based operating
system, application, or service
▪ Accounting for user actions
▪ Detecting intrusions or attempted intrusions

A

Audit Logs

25
Q

A manual review of accounts, permissions, configurations, and clearance levels at
a given interval

A

Recertification

26
Q

Security policies can be used to direct the behavior of end-user employees

A

Conduct and Use Policies

27
Q

A defined set of rules, ethics, and expectations for employees in a particular job
role

A

Code of Conduct

28
Q

A contract with terms stating a code of conduct for employees assigned high-level
privileges on network and data systems

A

Privileged User Agreement (PUA)

29
Q

A policy that governs employees’ use of company equipment and Internet
services

A

Acceptable Use Policy (AUP)