Identity and Access Management Terms (Ch. 4) Flashcards

1
Q

An authentication protocol that

periodically re-authenticates.

A

Challenge Handshake Authentication Protocol (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The point at which the FRR and FAR are equal. Sometimes called the equal error rate (ERR).

A

crossover error rate (CER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any technique that prevents a program from running

without the user’s approval.

A

data execution prevention (DEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software or techniques designed to detect attempts to exfiltrate data.

A

data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The rate at which a biometric solution allows in individuals it should have rejected.

A

false acceptance rate (FAR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The rate at which a biometric solution rejects individuals it should have allowed.

A

false rejection rate (FRR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A collection of computer networks that agree on standards of operation, such as security standards.

A

federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HIDS

A

A host-based intrusion detection system. An HIPS is a host-based intrusion prevention system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An authentication protocol developed at MIT that uses tickets for authentication.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The principle that any user or service will be given only enough access privileges to do its job and no more.

A

principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIDS

A

A network-based intrusion detection system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A tool that enumerates your network and provides a map of the network.

A

network scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OAUTH

A

Open Authorization standard
It is a common method for authorizing websites
or applications to access information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly