Week 1 Module 3 Flashcards

Digital Identity Model

1
Q

A _______ is a unique representation of a subject engaged in an online transaction.
A subject may have multiples for different contexts/domains (IE: Email and online banking)

A

Digital Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
The \_\_\_\_\_ involves processes and entities involved in creating digital identities and using them for authentication of subjects for online transactions.
A. Online Access Model
B. Online Identity Model
C. Digital Identity Model
D. Digital Access Model
A

C. Digital Identity Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 processes that make up the Digital Identity Model?

A

Enrollment/identity proofing
Credential Issuance
Authentication
Lifecycle Management Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When a subject (applicant) seeks a digital identity for a service is is applying to an entity called the _________.

A, Digital Service Provider
B. Credential Service Provider
C. Identity Service Provider
D. None of the above

A

B. Credential Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ establishes that a subject is actually who they claim to be.

A

Identity Proofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To help reduce errors in identity proofing there are 3 _________ associated with this process.
A. Identity Assurance Levels
B. Identity Proofing Levels
C. Digital Identity Levels

A

A. Identity Assurance Levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many levels are there in the Identity Assurance Levels?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Identity Assurance Level (IAL) requires NO evidence?

A

IAL1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the Digital Identity Model, what is the process that follows the Enrollment/Identity Proofing Process?

A

Credential Issuance Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the Credential Issuance Process, the CSP creates an ______ and binds them to one or more ________ to create a Credential.

A

identifier

authenticators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
An applicant becomes a \_\_\_\_\_ when issued credentials.
A. User
B. Subject
C. Subscriber
D. Enrollee
A

C. Subscriber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Enrollment, identity proofing and credential issuance may be delegated by the CSP to the _______.

A

Registration Authority (RA) or Identity Manager (IM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ______ occurs and starts the _____ process.

A

authentication event

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ______ is a subscriber wanting to get their identity verified to access a digital service.

A. User
B. Claimant
C. Requester
D. None of the above

A

B. Claimant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ______ is the entity that checks to make sure the identity is correct.

A

Verifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ___________ is the sequence of messages that enable a claimant to show possession and control of 1 or more authentictors to a verifier.

A

authentication protocol

17
Q

The authentication process’ strength is measured by what metric?

A

Authentication Assurance Level (AAL)

18
Q

Based on authentication, the verifier (or CSP) generates an assertion and send it to the ______, who either provides the digital service or its agent.

A

Relying Party (RP)

19
Q

T/F: If authentication is good, a session between the subscriber and relying party is established to provide the service requested.

A

True

20
Q

In a ______ architect, the RP outsources all identity proofing attribute collection and attribute storage to a CSP.

A

federated identity architecture

21
Q

The ______ is the protocol for conveying the assertion from the verifier (or CSP) to the Relying Party (RP)

A. verification protocol
B. assertion protocol
C. assurance protocol

A

B. assertion protocol

22
Q

The strength of the assertion protocol is expressed as ______, for which there are 3 levels.

A

Federation Assurance Level (FAL)

23
Q

The activities the CSP performs to maintain the credential, its status, and the enrollment data collected for the Credential is called what?

A. Lifecycle Management Process
B. Credential Management Process
C. Credential Lifecycle Process
D. None of the above

A

A. Lifecycle Management Process