Identity and Access Management Flashcards

1
Q

Proves who I am to the authenticating system

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What rights do I have to the system once I have been authenticated

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

takes place by me proving that i have authorization to that system

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Authentication factors

A

Knowledge, possession, inherence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Something you know authentication factor

A

Knowledge (passwords, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

something you have authentication factor

A

possession (smart card, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

something about you authentication factor

A

inherence (biometrics)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

inherited from a different trusted system

A

Federated trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

using two or more authentication factors

A

multi factor authentications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The things assigned to you that you can do

A

Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assigned at the system level

A

Rights/Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give your user or groups the least amount of privilege to their job done

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Labels authorization mode

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

owner of the data defines access

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access to resources is defined by a set of rules (Groups)

A

Role-based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A list of permissions attached to an object

A

Access Control lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Tool used to configure a security policy setting on the local device, on a domain joined device and on a domain controller

A

Local Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Collection of settings that define what a system will look like and how it will behave for a defined group of users

A

Group Policy Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three permissions that can be given on a Linux file system?

A

Read, Write, Execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the three groups that can be given rights in a linux file system?

A

Owner, Group, Everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What command is used to change the permissions in a Linux File system?

22
Q

What command is used to change the owner in a Linux File system?

23
Q

What command is used to change the password of a user in a Linux File system?

24
Q

In a windows system, granted to users and groups on folders and files

A

NTFS Permissions

25
Permissions given to a folder is also given to sub folders and files within the folder
Inheritance
26
How can inheritance be turned off?
using the Deny checkbox
27
Networking protocol that provides AAA management for users who connect and use a network service
Remote Authentication Dial-In User Service (RADIUS)
28
What does the RADIUS server contain?
usernames and passwords
29
In RADIUS, what is the gateway that separates what we are trying to authenticate to and the person trying to authenticate?
RADIUS client
30
In RADIUS, what is the person or system trying to get authenticated called?
RADIUS supplicant
31
What four ports can RADIUS use?
1812, 1812, 1645, 1646
32
What is the downside to using RADIUS?
Doesn't handle authorization
33
What is the protocol developed by Cisco and released as an open standard in 1993??
Terminal Access Controller Access-Control System Plus (TACASC+)
34
What does TACASC+ handle?
authentication, authorization, and accounting (AAA)
35
what port does TACACS+ use?
49
36
What is the oldest authentication method that sends username and password in the clear?
Password Authentication Protocol (PAP)
37
Which authentication method has a key on both server and client, a challenge message, and sends hash along with challenge message over to the client?
Challenge-Handshake Authentication Protocol (CHAP)
38
Which authentication method is used for two windows systems within a work group logging into each other? Also referred to "double CHAP".
NT LAN Manager (NTLM)
39
Which authentication method uses windows domain controllers?
Kerberos
40
What port does Kerberos use?
Port 88
41
What is used exclusively for authenticating for web applications?
Security Assertion Markup Language (SAML)
42
Which authentication method is more of a structured language that allows one computer to go into someone else's directory and query and udpate it?
Lightweight Directory Access Protocol (LDAP)
43
What port does LDAP use?
TCP/UDP Port 389
44
using Kerberos, what is the domain controller called?
Key distribution center
45
What tool could you use to set up single sign on within a LAN?
Windows Active Directory
46
What is the protocol that allows Linux users to use Active Directory
SAMBA
47
What determines the number of times you can unsuccessfully attempt to log in before you are shut out of the system for a specified period?
account lockout threshold
48
Where are the settings for passwords located?
Local Security Policy
49
What relates to how long a password is active before it must be changed?
Maximum password age
50
What determines how long the user will be locked out of the system before he can attempt to log on again?
Account lockout duration