701 - Chapter 2 Flashcards

1
Q

Within the access control process, what is the process of tracking user activity and recording the activity in the logs? This activity along with related others creates what?

A

Accounting, audit Trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main authentication factors, and what is the fourth?

A

Something you know, something you have, something you are… Somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Something you know typically refers to what?

A

A shared secret… Such as a password or a PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the current password recommendations per Microsoft, NIST, and the US DHS?

A

Hash all passwords, require MTA, don’t require mandatory password resets, require passwords to be at least eight characters, check for common passwords and prevent their use, tell users not to use the same password on more than one site, allow all special characters, including spaces but don’t require them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four common character types included in passwords?

A

Uppercase, lowercase, numbers, special characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false the best practice for password security is to have password expiration policies

A

False… Allowing users to keep their passwords for as long as they like is considered best practice because the thinking is they will use very strong password when only having to do it one time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false A password is considered complex if it uses at least three of the four character types

A

False, complex passwords will use a mix of all four character types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the minimum number in days before a password can be changed called?

A

Password age

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What remembers past passwords for users and prevents them from reusing them?

A

A password history system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a single source designed to keep most of your passwords?

A

Password manager or password vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is KBA and what are the two types?

A

Knowledge based authentication…static and dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is static KBA used?

A

For users with an account, it’s the security questions and answers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is dynamic KBA mostly used?

A

For users without an account, the site will query public and private data sources like credit reports, vehicle registrations, taxes to craft multiple-choice questions that only the user would know. In addition, there is a limited amount of time in order to answer these questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the use of dynamic KBA to verify a new users identity when they are creating an account for the first time? And what is this an important step for?

A

Identity proofing…the provisioning process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the maximum number of times a user can enter the wrong password? and how long an account remains locked is called what?

A

Account lockout threshold and account lockout duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Account lockout policies are meant to thwart what type of attacks?

A

Brute force, and dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the four things that a smart card provides?

A

Confidentiality, integrity, authentication, non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True or false smart cards provide two factor authentication?

A

True… Something you have and something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A random number that is provided to you and that you use to provide to an authentication server is called what?

A

One time password 0TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hard tokens and soft tokens, both use what?

A

One time passwords, OTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the two different ways that tokens remain in sync with authentication servers regarding generating OTPs?

A

HMAC based one time password, HOTP and time based one time password TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When does a HOTP password expire? And when does a TOTP expire?

A

Does not expire until it is used, expires after 30 to 60 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or false SMS for two step authentication is very secure

A

False it’s use is discouraged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the notification called that instead of using a code, it asks the user to acknowledge the request on their phone?

A

Push notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Smart cards, security keys, hard tokens, soft tokens, SMS and push notifications are all examples of what with regards to two factor authentication?
Something you have
26
What measures some physical characteristic of the user to confirm their identity?
Biometrics
27
True or false biometrics are the strongest form of authentication because they are the most difficult for an attack or to falsify?
True
28
Name the seven biometric methods…
Fingerprints, vein matching, retina imaging, iris scanners, facial recognition, voice recognition, gait analysis
29
Which of the biometric methods is used at many passport free border crossings around the world?
Iris scanners
30
What uses the facial recognition system?
iPhones
31
What two methods of bio metrics are the strongest
Iris and retina scans
32
What two biometric methods are passive and can even bypass the enrollment process when used for identification instead of authorization?
Facial recognition and gait analysis
33
What are the four possible results for a biometric system when attempting to authenticate the user?
False acceptance FAR, false rejection FRR, true acceptance, true rejection
34
What is the metrics that refers to the performance of the biometric system under ideal conditions called?
Efficacy rate
35
Increasing the sensitivity of a biometric system does what to the FAR and what to the FRR?
Decreases and increases
36
What is the point where the FAR and the FRR cross?
The crossover error rate CER
37
What do many authentication systems use for Geo location with somewhere you are?
The IP address
38
True or false, using two methods in the same factor of authentication for example, something you know, is still two factor authentication
False… Two factor authentication uses two different authentication factors for example, something you have and something you know
39
True or false password less authentication is not necessarily multifactor authentication?
True, it can still be a single something you have or something you are factor
40
What is usually logged in the authentication log for a user login attempt?
What happened success or failure, when it happened, where it happened, typically an IP address or computer name and who which refers to the user account
41
This type of account is for regular users or for the personnel working in that organization?
Personnel or end user accounts
42
This account type is a privileged account that has additional rights and privileges beyond what a regular user has? For Linux Systems what is this account called?
Administrator and root accounts
43
This account type allows an application to run under its context?
Service account
44
This account type is for computers and other devices?
Device account
45
This account type is for external entities that have access to your network?
Third-party accounts
46
This account type is included with windows by default and allow limited access to a computer or network?
Guest account
47
This account type can be used by temporary workers and will be shared, these accounts are also discouraged for normal work?
Shared and generic account/credentials
48
This type of system implements stringent security controls over accounts with elevated privileges, such as administrator or root level accounts?
Privileged access management PAM Systems
49
What is the concept of granting permissions at time of need? And what systems tend to use this concept?
Just in time permissions… PAM Systems
50
What is a temporary account that are issued for a limited period of time and then are destroyed when the user is finished with their work?
Temporal accounts
51
What are the five capabilities of a PAM system?
Allow users to access the privileged account without knowing the password, automatically change privileged account passwords, limit the time users can use the privilege account, allow users to check out credentials, log all access of credentials
52
PAM Systems are the protection against what types of attacks?
Where an attacker gets access to administrative account and password
53
What is common for administrators to have with regards to accounts?
To have two accounts, one as a regular day-to-day user and the other is the administrator account
54
An administrator having two accounts minimizes what risk by using their normal day-to-day account?
Privilege escalation where malware can assume the privileges of the logged in account
55
What is the process used to disable a users account when they leave the organization?
Deprovisioning
56
Why is an account initially disabled rather than deleted?
Disabling the account ensures that the data associated with it remains available. One example is the security keys associated with that account that are used for encryption.
57
What is it called when a user can only log onto computers during specific times?
Time based logins or time of day restrictions
58
What is the process an Organization will perform that looks at the rights and permissions assigned to users, and helps enforce the least privilege principle?
An account audit or Permission auditing reviews
59
What is a common problem that violates the principle of least privilege and occurs when a users granted more and more privileges due to changing job requirements but the unneeded privileges are never removed?
Privilege creep
60
What is the formal process for reviewing user permissions called?
Attestation
61
This review looks at the logs to see what users are doing, and it can be used to re-create an audit trail?
A usage audit review
62
What refers to a user ability to log on once and access multiple systems without logging on again?
Single sign on
63
What does SSO use for additional logins after the first sign on?
A secure token for authentication
64
What is the power behind SSO Systems?
Their interoperability with the many operating systems, devices, applications, and services used in an organization
65
What is a core component of many single sign-on systems?
LDAP or lightweight directory access protocol
66
What is it called when two or more separate organizations want to utilize SSO? And what do they need for it to work?
Federation… a federated identity management system
67
What can be used for SSO on web browsers and can act as a federated identity management system for them?
security assertion markup language, SAML
68
What standard is SAML based on?
XML
69
What are the three objects defined by SAML?
The principal which is typically a user, an identity provider, a service provider
70
In SAML, this role creates, maintains and manages identity, information authentication, and authorization for principals?
Identity provider
71
In SAML, this is the entity that provides services to the principles?
Service provider
72
This is an open standard for authorization that many companies used to provide secure access to protected resources?
OAuth
73
This authorization model uses roles based on jobs and functions?
Role based access control (role-BAC)
74
What are two other names used for role-BAC?
Hierarchy based and job/task/function based
75
What is a planning document at matches rules with the required privileges in role-BAC?
A roles and permissions matrix
76
An implementation of role-BAC based on organizational groups is called what
Group based privileges
77
What is a benefit of group based privileges?
They reduce the administrative workload of access management as users assigned to a group automatically inherit the privileges assigned to that group
78
This authorization model uses a set of approved instructions such as an ACL?
Rule-based access control or rule-BAC
79
What is a common example where rule – BAC is used?
Routers and firewalls
80
How can an IPS extend rule – BAC?
By using rules that can trigger a response to an event such as modifying an ACL after detecting an attack or granting additional permissions to a user in certain situations
81
What is the access control where objects have an owner and the owner establishes access to those objects? What is a common example?
Discretionary access control DAC…windows NTFS
82
What is a deny by default policy? And what is another name for that?
If allow access is not granted the system denies access by default… An implicit deny
83
This form of access control uses labels that are assigned to both subject and objects that require a match for both for access to be granted?
Mandatory access control MAC
84
This version of Linux uses MAC?
Security enhanced Linux SELinux
85
What does a MAC scheme use to define and illustrate different levels and labels of security to classify both users and data?
A lattice
86
One other restriction that a MAC scheme provides is what?
A restriction based on a need to know
87
This form of access access control, evaluates attributes, and grants access based on the value of these attributes?
Attribute based access control ABAC
88
What commonly uses ABAC access control?
Software defined networks SDN
89
With ABAC, what are the rules called?
Policy statements
90
What are the four elements in an ABAC policy statement?
Subject, object, action, environment
91
When reviewing authentication logs, what are some of the key things that you should be looking out for?
Account lockouts, concurrent session usage, impossible travel time, blocked content, resource consumption, resource, inaccessibility, log anomalies