Identity & Access Management Flashcards

1
Q

An unified login experience when accessing one or more systems

A

Single Sign On (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Involves the use of simply one of the three available factors solely in order to carry out the authentication process being requested

A

Single Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A version of the SAML OASIS standard for exchanging authentication & authorization data between security domains

A

Security Assertion Markup Language 2.0 (SAML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An access control model that based on a list of predefined rules that determine what accesses should be granted

A

Rule-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An access control model that bases the access control authorizations on the roles that the user is assigned within an organization

A

Role-Based Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A non-contact, automatic identification technology that uses radio signals to identify, track, sort and detect a variety of objects including people, vehicles, goods, & assets without the need for direct contact

A

Radio Frequency Identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allows authorized security personnel to simultaneously manage & monitor multiple entry points from a single centralized location

A

Physical Access Control Systems (PACS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A system that manages passwords consistently across the enterprise

A

Password Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity

A

Multi-Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Control that requires the system itself to manage access controls in accordance with the organization’s security policies

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A 48-bit number that is supposed to be globally unique

A

MAC Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Protection mechanisms that limit user’s access to information & restrict their forms of access on the system to only what is appropriate for them

A

Logical Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Developing standard for authenticating network users. Offers two key benefits: Functions in a multi-vendor network, & it does not transmit passwords over the network

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Process of collecting & verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be, & establishing a reliable relationship

A

Identity Proofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud-based services that broker identity & access management functions to target systems on customer’s premises and/or in the cloud

A

Identity as a Service (IDaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Protects enterprise assets & provides a history of who gained access & when the access was granted

A

Facility Access Control

17
Q

The process of establishing confidence in user identities electronically presented to an information system

A

Electronic Authentication

18
Q

A hardware device that contains non-programmable logic & non-volatile storage dedicated to all cryptographic operations & protection of private keys

A

Cryptographic Device

19
Q

Process of defining the specific resources a user needs & determining the type of access to those resources the user may have

A

Authorization

20
Q

Process of verifying the identity of the user

A

Authentication

21
Q

Systems that attempt to streamline the administration of user identity across multiple systems

A

Account Management Systems

22
Q

Physical or electronic systems designed to control who, or what, has access to a network

A

Access Control Systems

23
Q

Used to enter secured areas of a facility & are used in conjunction with a badge reader to read information stored on the badge

A

Access Badge

24
Q

Provides the system with a way of uniquely identifying a particular user among all the users of that system

A

User ID

25
Q

A local hardware encryption engine & secured storage for encryption keys

A

Trusted Platform Module