Podcast
Questions and Answers
What does a user do during the identification step?
What does a user do during the identification step?
- Proves their role
- Scans a card
- Unlocks access
- Claims an identity (correct)
Which process checks if the user has permission to access a resource?
Which process checks if the user has permission to access a resource?
- Authorization (correct)
- Accounting
- Identification
- Biometrics
What feature prevents users from using old passwords?
What feature prevents users from using old passwords?
- Password history (correct)
- Password vault
- Two-step verification
- Lockout threshold
What is enforced by a password expiration policy?
What is enforced by a password expiration policy?
Which policy setting determines how long a locked account stays locked?
Which policy setting determines how long a locked account stays locked?
Which method uses an app or SMS to send a code to the user?
Which method uses an app or SMS to send a code to the user?
Which password policy helps prevent easy guessing?
Which password policy helps prevent easy guessing?
What kind of information does accounting in AAA keep?
What kind of information does accounting in AAA keep?
Which term means a system wrongly accepts an unauthorized person?
Which term means a system wrongly accepts an unauthorized person?
What does multifactor authentication require?
What does multifactor authentication require?
Which accounts should not be shared among multiple users?
Which accounts should not be shared among multiple users?
Which combination shows two-factor authentication?
Which combination shows two-factor authentication?
What should happen to accounts when employees leave the company?
What should happen to accounts when employees leave the company?
What is the purpose of account audits?
What is the purpose of account audits?
Which technology allows users to log in once and access multiple systems?
Which technology allows users to log in once and access multiple systems?
What is Role-Based Access Control (RBAC) based on?
What is Role-Based Access Control (RBAC) based on?
In a group-based privileges setup, where are permissions assigned?
In a group-based privileges setup, where are permissions assigned?
What is the benefit of assigning access to groups?
What is the benefit of assigning access to groups?
Which permission allows both reading and running a file?
Which permission allows both reading and running a file?
Which of the following is part of Conditional Access?
Which of the following is part of Conditional Access?
Flashcards
Identification in Security
Identification in Security
The process where a user claims to be someone.
Authorization
Authorization
Process of verifying a user's permissions to access resources.
Password History
Password History
A security feature that blocks the reuse of old passwords.
Password Expiration Policy
Password Expiration Policy
Signup and view all the flashcards
Lockout duration
Lockout duration
Signup and view all the flashcards
Two-Step Verification
Two-Step Verification
Signup and view all the flashcards
Password Complexity
Password Complexity
Signup and view all the flashcards
Accounting in AAA
Accounting in AAA
Signup and view all the flashcards
False Acceptance
False Acceptance
Signup and view all the flashcards
Multifactor Authentication
Multifactor Authentication
Signup and view all the flashcards
Two-factor authentication example
Two-factor authentication example
Signup and view all the flashcards
Shared/Generic account risk
Shared/Generic account risk
Signup and view all the flashcards
Offboarding Account Action
Offboarding Account Action
Signup and view all the flashcards
Purpose of Account Audits
Purpose of Account Audits
Signup and view all the flashcards
Single Sign-On (SSO)
Single Sign-On (SSO)
Signup and view all the flashcards
Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC)
Signup and view all the flashcards
Group-Based Privileges
Group-Based Privileges
Signup and view all the flashcards
Benefit of Group Access
Benefit of Group Access
Signup and view all the flashcards
Read & Execute permission
Read & Execute permission
Signup and view all the flashcards
Conditional Access Criteria
Conditional Access Criteria
Signup and view all the flashcards
Study Notes
Identification
- During the identification step, a user claims an identity.
Authorization
- Authorization is the process that checks if a user has permission to access a resource.
Password History
- A password history feature prevents users from re-using old passwords.
Password Expiration Policy
- A password expiration policy enforces that users change passwords regularly.
Lockout Duration
- Lockout duration determines how long a locked account stays locked.
Two-Step Verification
- Two-step verification uses an app or SMS to send a code to the user.
Password complexity
- Password complexity policy helps prevent easy password guessing.
Accounting in AAA
- Accounting in AAA (Authentication, Authorization, and Accounting) keeps an audit trail of user activity.
False Acceptance
- False acceptance is when a system wrongly accepts an unauthorized person.
Multifactor Authentication
- Multifactor authentication requires two or more different authentication factors.
Two-Factor Authentication Example
- A fingerprint scan and a Smart Card are an example of two-factor authentication.
Shared Accounts
- Shared and generic accounts should not be shared among multiple users.
Employee Account Handling
- When employees leave a company, their accounts should be disabled or deleted.
Account Audits
- Account audits purpose is to check and review account activities.
Single Sign-On (SSO)
- Single Sign-On (SSO) is a technology that allows users to log in once and access multiple systems.
Role-Based Access Control (RBAC)
- Role-Based Access Control (RBAC) is based on job roles and functions.
Group-Based Permissions Assignment
- In a group-based privileges setup, permissions are assigned to groups that include users.
Assigning Access to Groups
- Assigning access to groups eases permission management.
Read & Execute Permissions
- Read & Execute permission allows both reading and running a file.
Conditional Access
- Group membership or IP location is part of conditional access.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.