Ch3 Identity and Access Management Flashcards

1
Q

Authentication is

A

proving you have rights to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorization is

A

proving which rights you have to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the main 3 Authentication factors are _____ another two are ___

A

something you know, something you have, something about you; something you do and somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

combining different types of authorization is called ____ authorization

A

multifactor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______ is a system where a central authority decides that since you are trusted on one system, you can be trusted on another

A

Federated Trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ are things you can do that have been assigned to you

A

Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ are things that everyone on a system can do

A

rights and privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the idea that just because you need access to data doesn’t mean you need to be able to delete it is an example of _____

A

least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

having one person in charge of recording earnings and a different person in charge of payroll is an example of ____

A

separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ access control might use a label, such as “top secret”

A

mandatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in ____ access control the owner of the data decides who has access to what

A

discretionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ access control defines access according to rules for groups of people

A

role-based (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ means assuming you are not permitted to do something unless you are listed

A

implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a good password security policy will address which 3 topics?

A

complexity, expiration and history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

in windows ___ you can set rules for passwords, logins and lockouts

A

local security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

windows ___ are like local security policy, but can work across an active directory in windows network server

A

group policy objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

in Linux, use the command ___ to see the permissions for all the files in a directory

A

“ls -l”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

in Linux, permission rights for an object are shown by the three characters ___ repeated 3 times for the ___, ___ and ___ respectively

A

rwx; owner; group; everyone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

to give full permissions in Linux to the owner, but only read permissions to groups and others, use the alphabetical command _____ or the numeric command _____

A

chmod g=r FileName; chmod 744 FileName

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

to change the ownership in Linux of a file, use the command ___

A

sudo chown NewOwner FileName

21
Q

to change the password of a file in Linux, use the command ___

A

sudo passwd [and wait for prompt]

22
Q

in a Windows system, create users and groups with different permissions through the ___ system

A

Computer Management

23
Q

When you change the permissions for a file in Windows, this change is automatically applied to all files in the folder, and subfolders, this is called ___

A

inheritance

24
Q

to override security permissions inheritance for a file, use the _____

A

deny checkbox in the file properties

25
security settings are lost if a file is ___ in the same drive or moved to a ___ drive
copied; non-NTFS
26
what happens to file security permissions if you move or copy the file onto another NTFS drive?
the file takes on the permissions of the folder you place it into
27
continually monitor ___ and ___ of users in general
login/logoff; file access
28
if someone needs to have multiple accounts, then make sure their ___ and ___ are different, and be sure to exercise the principle of ___
username; passwords; least privilege
29
in general, enforce non-repudiation by avoiding ___ accounts and ___ usernames
shared; generic
30
what is the AAA of access?
authentication; authorization; accounting
31
the ___ network security protocol was originally developed for dial-up connections, but is now used for wireless networks
Remote Authentication Dial-in User Service (RADIUS)
32
the weakness of RADIUS authentication is that is doesn't perform ___
authorization
33
the user attempting to get authenticated in a RADIUS network is called the ___
supplicant
34
RADIUS systems can use up to ___ UDP ports
4
35
the ___ system performs both authentication and authorization for networks
Terminal Access Controller Access-Control System Plus (TACACS Plus)
36
TACACS systems use TCP port ___
49
37
___ is the oldest authentication system, not used anymore because is uses no encryption
Password Authentication Protocol (PAP)
38
in a ___ authentication system, the server sends a hash of its key, the client's key and a question to be answered
Challenge Handshake Authentication Protocol (CHAP)
39
a windows ___ authentication system is like a CHAP system done from both sides
NT LAN Manager
40
a ___ authentication system works with a windows domain controller between the client and server
Kereberos
41
in a Kereberos authentication system, the domain server acts as a ___, granting tickets for access
Key Distribution Center (KDC)
42
a Kereberos authentication system uses TCP and UDP port ___
88
43
in a Kereberos authentication system, a ___ is used to get a session key
Ticket Granting Ticket (TGT)
44
a ___ authentication system is used primarily for web applications, or to access devices that are physically spread out - not for file sharing
Security Assertion Markup Language (SAML)
45
___ is not really an authentication protocol, but is used to access someone else's directory, and uses TCP/UDP port ___
Lightweight Directory Access Protocol (LDAP); 389
46
to establish single sign-on to a network of computers, usually you will want to use ___ even if they aren't running Windows
windows active directory
47
to use Windows Active Directory on a network, you must first install ___, then establish a ___
Windows Server; Domain
48
the ___ authorization model is based on data labels
mandatory access control (MAC)