Lesson 8 - Implementing Identity and Account Management Controls Flashcards

1
Q

The process of bringing in a new employee, contractor, or supplier.

A

Onboarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An agreement that stipulates that entities will not share confidential information, knowledge, or materials with unauthorized third parties.

A

nondisclosure agreement (NDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A concept that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse of powers.

A

Separation of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The policy of preventing any one individual performing the same role or tasks for too long. This deters fraud and provides better oversight of the person’s duties.

A

Job Rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The principle that states when and how long an employee must take time off from work so that their activities may be subjected to a security review.

A

Mandatory Vacation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of ensuring that all HR and other requirements are covered when an employee leaves an organization.

A

An exit interview (or offboarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A collection of user accounts that are useful when establishing file permissions and user rights because when many individuals need the same level of access.

A

a security group account
a group could be established containing all the relevant users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Default administrative and guest accounts configured on servers and network devices are possible points of unauthorized access.

A

default account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A host or network account that is designed to run a background service, rather than to log on interactively.

A

Service accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The value assigned to an account by Windows and that is used by the operating system to identify that account.

A

Security Identifier (SID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On a Windows domain, a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, and so on.

A

Group Policy Objects (GPOs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A set of rules governing user security information, such as password expiration and uniqueness, which can be set globally.

A

Account policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The identification or estimation of the physical location of an object, such as a radar source, mobile phone, or Internet-connected computing device.

A

Geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The practice of creating a virtual boundary based on real-world geography.

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The addition of location metadata to files or devices.

A

Geotagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Policies or configuration settings that limit a user’s access to resources.

A

Time of day policy

18
Q

An employee who gains more and more access privileges the longer they remain with the organization.

A

Authorization Creep

19
Q

If a user has moved to a new job, old privileges may need to be revoked and new ones granted.

A

Recertification

20
Q

Security settings that control access to objects including file system items and network resources.

A

Permissions

21
Q

Access control model where each resource is protected by an Access Control List (ACL) managed by the resource’s owner (or owners).

A

Discretionary Access Control (DAC)

22
Q

An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.

A

Role-Based Access Control (RBAC)

23
Q

Each record in the ACL is called an access control

A

ACE
ACLs can be enforced by a file system that supports permissions, such as NTFS, ext3/ext4, or ZFS.

24
Q

Linux command for managing file permissions.

A

chmod

25
Q

Access control model where resources are protected by inflexible, system defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label).

A

Mandatory Access Control (MAC)

26
Q

An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.

A

Attribute-Based Access Control (ABAC)

27
Q

A non-discretionary access control technique that is based on a set of operational rules or restrictions to enforce a least privileges permissions policy.

A

Rule-Based Access Control (RBAC)
As such, RBAC, ABAC, and MAC are all examples of rule-based (or non-discretionary) access control.

28
Q

Policies, procedures, and support software for managing accounts and credentials with administrative permissions.

A

Privileged access management (PAM)

29
Q

A network service that stores identity information about all the objects in a particular network, including users, groups, servers, client computers, and printers.

A

Directory Services
The Lightweight Directory Access Protocol (LDAP) is a protocol widely used to query and update X.500 format directories.

30
Q

A unique identifier for any given resource within an X.500-like directory.

A

Distinguished Name

31
Q

A process that provides a shared login capability across multiple systems and enterprises. It essentially connects the identity management services of multiple systems.

A

Federation

32
Q

In a federated network, the service that holds the user account and performs authentication.

A

Identity Provider (IdP)

33
Q

An XML-based data format used to exchange authentication information between a client and a service.

A

Security Assertions Markup Language (SAML)

34
Q

An XML-based web services protocol that is used to exchange messages.

A

Simple Object Access Protocol (SOAP)

35
Q

Standard for federated identity management, allowing resource servers or consumer sites to work with user accounts created and managed on a separate identity provider.

A

OAuth

36
Q

An authentication layer that sits on top of the OAuth 2.0 authorization protocol.

A

OpenID Connect (OIDC)
OAuth is explicitly designed to authorize claims and not to authenticate users.
OpenID uses XML-format messaging and supports only web applications and not mobile apps.

37
Q

A policy that governs employees’ use of company equipment and Internet services. ISPs may also apply AUPs to their customers.

A

Acceptable Use Policy

38
Q

Professional behavior depends on basic ethical standards, such as honesty and fairness. Some professions may have developed codes of ethics to cover difficult situations; some businesses may also have a code of ethics to communicate the values it expects its employees to practice.

A

Code of Conduct

39
Q

An organizational policy that mandates employee work areas be free from potentially sensitive information; sensitive documents must not be left out where unauthorized personnel might see them.

A

Clean Desk Policy

40
Q

Training event where learners must identify a token within a live network environment.

A

Capture the Flag (CTF)

41
Q
A

Computer-Based Training (CBT)