Identity and Access Management Flashcards

(49 cards)

1
Q

NTFS file permissions

A
full control
modigy
read and execute
read
write
special permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

-List of information to handle how everyone is given access

A

Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Federated Sytstem

A

System that is trusted by the domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Samba

A

Allows Linux machines to use Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

KDC

-Windows Domain Controller is known as KDC

A

Key Distribution Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PIV card

-Picture and Identification information

A

Personal Identity Verification card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Windows File Permissions

-moving files on same hard drive to a new location what happens to permissions?

A

Keeps permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Linux File Permissions

A

D RWX RWX RWX

  • Directory
  • Owner
  • Group
  • Everyone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multifactor Authentication

A

Using more than one authentication factor

ex: finger print and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Linux command for editing permissions

A

chmod
O= everyone (stands for other)
G= group
A= all 3 catergories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Kerberos

A

Authentication protocol used to authenticate to windows domain controller
-Uses port 88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NTFS folder permissions

A
full control
modigy
read and execute
list folder content
read
write
special permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PAP

  • Sends username and password in the clear
  • Not used very often anymore
A

Password Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Implicit Deny

A

Always denies unless told otherwise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AAA

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CHAP

  • Uses a hash value to authenticate
  • Sends the hash to whoever is trying to get authenticated as the challenge - they have to recreate the hash using the same shared key and send back as proof
A

Challenge-Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SAML

  • Used for web applications
  • Single Sign-On allows access between an identity provider and a service provider
A

Security Assertion Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Linux permissions (numbers = permissions)

A
0 = ---
1 = --x
2 = -w-
3 = -wx
4 = r--
5 = r-x
6 = rw-
7 = rwx
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

File system that doesn’t support windows permissions

A

Fat32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Linux command for changing owner

21
Q

Windows system for passwords and general management

-Usually for that particular local machine

A

Local Security Policy

22
Q

RBAC

  • Most common
  • Access to resources is defined by your role
A

Role-Based Access Control

23
Q

Windows File Permissions

-copying files from drive letter to another drive letter on the same hard drive what happens to permissions?

A

Loses permissions

24
Q

Rights and Privileges

A

Mostly used for system function access

25
MAC | -Labels "top secret"
Mandatory Access Control
26
TGT | -Shows that you're authenticated to domain
Ticket Granting Ticket
27
TACACS+ - Decouples the authorization from the authentication - Uses TCP port 49
Terminal Access Controller Access-Control System Plus
28
LDAP - Used to access other directories/resources - More of a language than authentication protocol
Lightweight Directory Access Protocol | -Uses TCP and UDP port 389
29
``` RADIUS -Used in wireless authentication -Can use ports: 1812 1813 1645 1646 ```
Remote Authentication Dial-In User Service
30
RSA Key
Software/key that stores a secret code that changes every so often - "something you have"
31
Authorization
What rights you have to the system once you've been authenticated
32
CAC card | -Picture and Identification
Common Access Card
33
Least Privilege
Always give the least amount of privilege to users for them to do their job
34
RADIUS client
Gateway for server and user
35
NTLM - Like CHAP but both ways - Client and server each challenge the other side with a hash value
NT Lan Manager
36
HOTP | -fob creates single use code using key and counter
HMAC-based One-Time Password algorithm
37
Identification
Proves who you are to the authenticating system
38
Group Policy Objects Management
Found in Active Directory | Can be applied to domains/individual sites/groups
39
What are the 5 Authentication Factors
1. Something you know - password 2. Something you have - smartcard/key fob 3. Something about you - retinal scanners 4. Something you do - rhythm of typing can be used 5. Somewhere you are - geography/zip code getting gas
40
RADIUS server
Holds or has access to passwords/usernames
41
Authentication
Proving you have the rights to that system | ex: password
42
Windows File Permissions | -copying files from drive to another drive what happens to permissions?
Loses permissions
43
Linux command for changing password
sudo passwd
44
Inheritance
When you give a folder permissions, anything created in that folder will have mirrored permissions with options greyed out
45
Permissions
Usually handled in groups for organizations - more used for files and resources
46
RADIUS supplicant
Person or system trying to get authenticated
47
Captcha
Used on websites - wonky lettering or pictures you have to identify to prove you're not a bot - "something you know"
48
DAC | -Whoever created data defines access
Discretionary Access Control
49
TOTP | -fob creates single use code using key and time of day
Time-based One-Time Password algorithm