Day 1: Identity & Access Management Flashcards

(22 cards)

1
Q

What are the 5 factors of authentication?

A

Something you know, have, are, do, and somewhere you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is MFA and why is it important?

A

Multifactor authentication uses two or more different types of authentication factors to increase security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does SSO allow?

A

A single login that grants access to multiple systems or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protocol is commonly used in federated identity?

A

SAML or OAuth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is OAuth different from OpenID Connect?

A

OAuth handles authorization, OpenID Connect adds authentication on top of OAuth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between LDAP and RADIUS?

A

LDAP is used for directory services, RADIUS is used for centralized AAA services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a key difference between RADIUS and TACACS+?

A

TACACS+ encrypts the entire packet and separates authentication and authorization; RADIUS only encrypts the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Compare RBAC and ABAC.

A

RBAC assigns permissions to roles, while ABAC evaluates attributes like time, location, and device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multifactor Authentication Methods:

A

Something you know – password, PIN

Something you have – smart card, security token

Something you are – fingerprint, retina scan (biometrics)

Something you do – typing rhythm, behavior patterns

Somewhere you are – GPS, IP address, location-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Centralized Identity Services:

A

LDAP (Lightweight Directory Access Protocol): Manages user directory info

RADIUS (Remote Authentication Dial-In User Service): AAA over networks, encrypts only passwords

TACACS+ (Terminal Access Controller Access-Control System Plus): Cisco AAA, encrypts entire packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policy-Based Access Controls:

A

RBAC (Role-Based Access Control): Access based on user role (e.g., Admin, HR)

ABAC (Attribute-Based Access Control): Uses attributes like department, device, time to determine access

Rule-Based: If/then conditions for system operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication Factors:

A

Something you know (password), have (token), are (biometric), do (behavioral), or somewhere you are (location)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MFA (Multifactor Authentication):

A

Combines two or more factors to verify identity (e.g., password + fingerprint)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSO (Single Sign-On):

A

Log in once to access multiple systems (e.g., corporate suite)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Federated Identity:

A

Allows users from one domain to access resources in another via SAML (Security Assertion Markup Language) or OAuth (Open Authorization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAML (Security Assertion Markup Language):

A

XML-based, used for enterprise SSO between identity providers and service providers

17
Q

OAuth (Open Authorization):

A

Authorization protocol (often paired with OpenID Connect for authentication)

18
Q

LDAP (Lightweight Directory Access Protocol):

A

Used for centralized user directory services

19
Q

RADIUS (Remote Authentication Dial-In User Service):

A

Centralized AAA (Authentication, Authorization, Accounting), encrypts only password

20
Q

TACACS+ (Terminal Access Controller Access-Control System Plus):

A

Cisco proprietary AAA, encrypts entire packet, separates authentication and authorization

21
Q

RBAC (Role-Based Access Control):

A

Permissions assigned to roles, then to users

22
Q

ABAC (Attribute-Based Access Control):

A

Uses policies that evaluate attributes (e.g., time of access, user role)