Week 09 Flashcards
What is Identity and Access Management (IAM)?
IAM is a framework that ensures the right individuals access the right resources at the right times for the right reasons, involving identification, authentication, authorization, and accountability.
T/F: In IAM, the “Subject” is the passive entity containing information, while the “Object” is the entity requesting access.
False. The Subject is the entity requesting access, and the Object is the passive entity containing information.
Which of the following is NOT a type of biometric authentication?
A) Fingerprint
B) Iris scan
C) Password
D) Voice recognition
C) Password
Fill in the Blank
Q: The three general factors used for authentication are:
Something a person __________ (knowledge factor).
Something a person __________ (possession factor).
Something a person __________ (inherent factor).
knows, has, is
What is Single Sign-On (SSO)?
SSO allows a user to authenticate once and access multiple applications or systems without re-authenticating each time.
Multi-Factor Authentication (MFA) is more secure than Single-Factor Authentication (SFA) because it requires multiple types of credentials.
True
Which access control model grants or denies access based on user roles and responsibilities?
A) Discretionary Access Control (DAC)
B) Role-Based Access Control (RBAC)
C) Mandatory Access Control (MAC)
D) Attribute-Based Access Control (ABAC)
B) Role-Based Access Control (RBAC)
The principle of __________ ensures that users only have the minimum level of access necessary to perform their job.
Least Privilege
What is the Crossover Error Rate (CER) in biometric systems?
CER is the point at which the False Acceptance Rate (FAR) equals the False Rejection Rate (FRR), used as a measure of biometric system accuracy.
A race condition occurs when two processes access the same resource sequentially, ensuring proper authorization and authentication.
False. A race condition occurs when two processes access the same resource concurrently, potentially leading to security flaws.
Which of the following is a component of the CIA triad in security principles?
A) Confidentiality
B) Integrity
C) Availability
D) All of the above
D) All of the above
__________ is the process of ensuring that users are held responsible for their actions within a system, typically through auditing and logging.
Accountability