Domain 5, IAM Flashcards

1
Q

What is a two way trust?

A

Trust flows in both directions bewteen two domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In Kerberos, what grants ticket granting tickets?

A

Authentication service via the KDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Kerberos, what does the authentication service do?

A

Issues ticket granting tickets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which federated ID management is a protocol for exchanging authentication between domains?

A

SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which federated ID management is an HTTP service?

A

OAUTH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which identity assurance level is the most strict?

A

IAL 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the FICAM Roadmap concerned with?

A

Provisioning and de-provisioning process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the procedures of the provisioning and de-provisioning process

A

Provision a user account and apply user permissions - user request, owner validate, app admin create account, notify
Modify user permissions - user request, resource owner validate, app admin modify, notify
Deprovision user account and end user permissions - resource owner notification, app admin removal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a shortcut trust?

A

A trust that is explicitly defined in addition to the trust relationships already created between domains in a forest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are four types of domain trusts?

A

One way
Two Way
Short cut
External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the parts to IDaaS?

A

IGA - identity governance and administration - provisioning of users to cloud applications and password reset functionality
Access - user authentication, SSO, authorization, federation
Intelligence - identity access log monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Kerberos, what identifies a service?

A

Service principal name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the OAUTH roles?

A

Resource Owner
Resource Server
Client Application
Authorization Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SOAP?

A

Simple object access protocol
An XML structure for messages over HTTP, used to exchange structured information to web services. It is encapsulated data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an external trust?

A

Used between forests and organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which message protocol is often identified by encapsulation?

A

SOAP

17
Q

In Kerberos, what identifies a user?

A

User principal name

18
Q

In Kerberos, what does the user principal name do?

A

Identifies a user

19
Q

Which IAL is self asserted?

A

IAL 1

20
Q

What is SASL?

A

Simple authentication and security layer, a framework for authentication and data security in internet protocols. It is non-proprietary and decentralized. Works with a variety of authentication methods and can be used for directory access.

21
Q

What are the objects in the access control MAC?

A

Files
folders
print queues
devices

22
Q

What could be consulted to see what a subject could do to an object?

A

Capability table

23
Q

How does MAC treat subjects and objects?

A

Subjects are active and objects are passive upon which subjects act.

24
Q

What are the steps in provisioning a user account and applying permissions?

A

The user requests access
The resource owner validates the request
The application administrator creates the account and applies permission
The user is notified

25
Q

What are the types and particular issues with biometrics?

A

Type 1 - FRR - False Rejection Rate
Type 2 - FAR - False Acceptance Rate
CER - Crossover Error Rate

26
Q

What are the SAML roles?

A

Identity Provider
Service Provider / Relying Party
User / Principal

27
Q

What are the parts of the credential enrollment process?

A
Sponsorship
Enrollment
Credential Production
Issuance
Credential Lifecycle Management
28
Q

In kerberos, what validates ticket granting tickets?

A

Ticket granting service

29
Q

In Kerberos, what does a ticket granting service do?

A

Validates the ticket granting ticket and grants a service ticket.

30
Q

What are the steps in de-provisioning access?

A

The resource owner notifies the application administrator

The application administrator removes the access

31
Q

What are the Identity Assurance Levels?

A

IAL 1 - attributes are self asserted
IAL 2 - remote or in person identity proofing is required
IAL 3 - in person identity proofing is required and verified by a Credential Service Provider

32
Q

What is a capability table?

A

A table of subjects and objects indicating what actions individuals can take upon individual objects.

33
Q

What is a one way trust?

A

Trust flows in one direction from one domain to another.

34
Q

What is FICAM

A

Federated Identity, Credential, and Access Management

35
Q

What are the special SIDs for Windows?

A

500 - Admin
501 - Guest
512 - Domain Admin

36
Q

What are the steps in modifying user permissions?

A

The user requests permission modification
The resource owner validates the request
The application administrator modifies the permissions
The user is notified