Identity Management and Authentication

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What does a user do during the identification step?

  • Proves their role
  • Scans a card
  • Unlocks access
  • Claims an identity (correct)

Which process checks if the user has permission to access a resource?

  • Authorization (correct)
  • Accounting
  • Identification
  • Biometrics

What feature prevents users from using old passwords?

  • Password history (correct)
  • Password vault
  • Two-step verification
  • Lockout threshold

What is enforced by a password expiration policy?

<p>Users change passwords regularly (C)</p> Signup and view all the answers

Which policy setting determines how long a locked account stays locked?

<p>Lockout duration (C)</p> Signup and view all the answers

Which method uses an app or SMS to send a code to the user?

<p>Two-step verification (C)</p> Signup and view all the answers

Which password policy helps prevent easy guessing?

<p>Password complexity (B)</p> Signup and view all the answers

What kind of information does accounting in AAA keep?

<p>Audit trail of user activity (B)</p> Signup and view all the answers

Which term means a system wrongly accepts an unauthorized person?

<p>False acceptance (A)</p> Signup and view all the answers

What does multifactor authentication require?

<p>Two or more different authentication factors (B)</p> Signup and view all the answers

Which accounts should not be shared among multiple users?

<p>Shared and generic accounts (D)</p> Signup and view all the answers

Which combination shows two-factor authentication?

<p>Fingerprint and smart card (B)</p> Signup and view all the answers

What should happen to accounts when employees leave the company?

<p>Disable or delete (B)</p> Signup and view all the answers

What is the purpose of account audits?

<p>To check and review account activities (A)</p> Signup and view all the answers

Which technology allows users to log in once and access multiple systems?

<p>Single Sign-On (SSO) (B)</p> Signup and view all the answers

What is Role-Based Access Control (RBAC) based on?

<p>Job roles and functions (D)</p> Signup and view all the answers

In a group-based privileges setup, where are permissions assigned?

<p>To groups that include users (A)</p> Signup and view all the answers

What is the benefit of assigning access to groups?

<p>Eases permission management (A)</p> Signup and view all the answers

Which permission allows both reading and running a file?

<p>Read &amp; Execute (B)</p> Signup and view all the answers

Which of the following is part of Conditional Access?

<p>Group membership or IP location (B)</p> Signup and view all the answers

Signup and view all the answers

Flashcards

Identification in Security

The process where a user claims to be someone.

Authorization

Process of verifying a user's permissions to access resources.

Password History

A security feature that blocks the reuse of old passwords.

Password Expiration Policy

A policy that ensures users update passwords regularly.

Signup and view all the flashcards

Lockout duration

A setting that determines how long an account remains locked after too many failed login attempts.

Signup and view all the flashcards

Two-Step Verification

A method using an app or SMS to send a verification code to the user, adding a security layer.

Signup and view all the flashcards

Password Complexity

A password policy that requires passwords to be complex (e.g., including different character types).

Signup and view all the flashcards

Accounting in AAA

Audit trail of user activities such as logins and access attempts.

Signup and view all the flashcards

False Acceptance

When a system incorrectly accepts an unauthorized user.

Signup and view all the flashcards

Multifactor Authentication

Requires at least two different methods to verify a user's identity.

Signup and view all the flashcards

Two-factor authentication example

Using something you are (fingerprint) with something you have (smart card).

Signup and view all the flashcards

Shared/Generic account risk

Accounts that should not be shared among multiple users.

Signup and view all the flashcards

Offboarding Account Action

When an employee leaves, accounts should be disabled/deleted.

Signup and view all the flashcards

Purpose of Account Audits

Account audits check and review user account activities.

Signup and view all the flashcards

Single Sign-On (SSO)

It allows users to log in once and access multiple systems.

Signup and view all the flashcards

Role-Based Access Control (RBAC)

Access control based on job roles and functions within an organization.

Signup and view all the flashcards

Group-Based Privileges

Permissions are assigned to groups that include users.

Signup and view all the flashcards

Benefit of Group Access

The management becomes easier when you assign access to groups.

Signup and view all the flashcards

Read & Execute permission

The permission that allows users to both read and execute a file.

Signup and view all the flashcards

Conditional Access Criteria

Group Membership or IP location is part of Conditional Access.

Signup and view all the flashcards

Study Notes

Identification

  • During the identification step, a user claims an identity.

Authorization

  • Authorization is the process that checks if a user has permission to access a resource.

Password History

  • A password history feature prevents users from re-using old passwords.

Password Expiration Policy

  • A password expiration policy enforces that users change passwords regularly.

Lockout Duration

  • Lockout duration determines how long a locked account stays locked.

Two-Step Verification

  • Two-step verification uses an app or SMS to send a code to the user.

Password complexity

  • Password complexity policy helps prevent easy password guessing.

Accounting in AAA

  • Accounting in AAA (Authentication, Authorization, and Accounting) keeps an audit trail of user activity.

False Acceptance

  • False acceptance is when a system wrongly accepts an unauthorized person.

Multifactor Authentication

  • Multifactor authentication requires two or more different authentication factors.

Two-Factor Authentication Example

  • A fingerprint scan and a Smart Card are an example of two-factor authentication.

Shared Accounts

  • Shared and generic accounts should not be shared among multiple users.

Employee Account Handling

  • When employees leave a company, their accounts should be disabled or deleted.

Account Audits

  • Account audits purpose is to check and review account activities.

Single Sign-On (SSO)

  • Single Sign-On (SSO) is a technology that allows users to log in once and access multiple systems.

Role-Based Access Control (RBAC)

  • Role-Based Access Control (RBAC) is based on job roles and functions.

Group-Based Permissions Assignment

  • In a group-based privileges setup, permissions are assigned to groups that include users.

Assigning Access to Groups

  • Assigning access to groups eases permission management.

Read & Execute Permissions

  • Read & Execute permission allows both reading and running a file.

Conditional Access

  • Group membership or IP location is part of conditional access.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser