Deck 8: Identity and Access Management

Full screen (f)
exit full mode
Question
Identity discovery involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
Use Space or
up arrow
down arrow
to flip the card.
Question
A distinct record in a system of record is called an

A) Password
B) Username
C) Identity
D) Account
Question
Identity reconciliation involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
Question
A person registry

A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
C) Is the process of comparing each discovered identity to a master record of all individuals in the organization
D) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
Question
For use as a biomarker, a physical trait must be

A) Searchable
B) Universal
C) Attractive
D) Inexpensive
Question
Authentication is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Question
Hardware or software tokens are used for

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The minute differences in physical traits used to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Question
Password synchronization technologies

A) Require the presentation of a token for authentication
B) Allow a user to authenticate once and obtain access to all authorized resources
C) Allow nodes in an insecure network to securely identify themselves to each other using tokens
D) Ensure that the user has the same username and password on all systems
Question
Biometrics is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Question
A password is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Question
A system of record is

A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Records from which information is retrieved by identifying particulars assigned to the individual
C) Process of comparing each discovered identity to a master record of all individuals in the organization
D) Central hub that connects identifiers from all Systems of Records into a single "master" identity
Question
The stages in identity management are

A) Denial, anger, bargaining, acceptance
B) Plan, do, check, act
C) Plan, acquire, deploy, manage
D) Discovery, reconciliation and enrichment
Question
Access management involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Making decisions about granting users access to resources
D) Collecting data about each individual's relationship to the organization
Question
Kerberos is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Question
Match/ merge is an industry term for

A) Identity reconciliation
B) Identity discovery
C) Identity enrichment
D) Access control
Question
Identity enrichment involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
Question
An individual's affiliation with the organization is called their

A) Access
B) Role
C) Account
D) Password
Question
Single sign-on technologies

A) Ensure that the user has the same username and password on all systems
B) Have no single point of failure
C) Allow a user to authenticate once and obtain access to all authorized resources
D) Allow nodes in an insecure network to securely identify themselves to each other using tokens
Question
The access registry

A) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
B) Is the process of comparing each discovered identity to a master record of all individuals in the organization
C) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
D) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
Question
Identity management involves

A) Identifying individuals and collecting data to determine access to resources
B) Providing security administrators with a single view of an individual's accounts and permissions across the entire organization
C) Maintaining records from which information is retrieved by identifying particulars assigned to the individual
D) Process of comparing each discovered identity to a master record of all individuals in the organization
Question
Federations are useful to

A) Authenticate users within an organization
B) Determine the authorizations of users to resources
C) Bridge authentication systems in separate organizations
D) Eliminate single points of failure in IT systems
Question
Kerberos has been very useful in securing corporate desktop infrastructures
Question
OpenID uses an

A) Insecure model of authentication
B) Centralized model for authentication
C) Federated model for authentication
D) Distributed model for authentication
Question
Kerberos has been very useful in securing web applications
Question
OAuth allows users to

A) Grant access to resources on one site to another site
B) Authenticate centrally
C) Authenticate using a federation
D) Authenticate using kerberos
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Identity and Access Management
1
Identity discovery involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
A
2
A distinct record in a system of record is called an

A) Password
B) Username
C) Identity
D) Account
Identity
3
Identity reconciliation involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
B
4
A person registry

A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
C) Is the process of comparing each discovered identity to a master record of all individuals in the organization
D) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
For use as a biomarker, a physical trait must be

A) Searchable
B) Universal
C) Attractive
D) Inexpensive
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Authentication is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Hardware or software tokens are used for

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The minute differences in physical traits used to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Password synchronization technologies

A) Require the presentation of a token for authentication
B) Allow a user to authenticate once and obtain access to all authorized resources
C) Allow nodes in an insecure network to securely identify themselves to each other using tokens
D) Ensure that the user has the same username and password on all systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Biometrics is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
A password is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
A system of record is

A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Records from which information is retrieved by identifying particulars assigned to the individual
C) Process of comparing each discovered identity to a master record of all individuals in the organization
D) Central hub that connects identifiers from all Systems of Records into a single "master" identity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
The stages in identity management are

A) Denial, anger, bargaining, acceptance
B) Plan, do, check, act
C) Plan, acquire, deploy, manage
D) Discovery, reconciliation and enrichment
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Access management involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Making decisions about granting users access to resources
D) Collecting data about each individual's relationship to the organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Kerberos is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Match/ merge is an industry term for

A) Identity reconciliation
B) Identity discovery
C) Identity enrichment
D) Access control
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Identity enrichment involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
An individual's affiliation with the organization is called their

A) Access
B) Role
C) Account
D) Password
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Single sign-on technologies

A) Ensure that the user has the same username and password on all systems
B) Have no single point of failure
C) Allow a user to authenticate once and obtain access to all authorized resources
D) Allow nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
The access registry

A) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
B) Is the process of comparing each discovered identity to a master record of all individuals in the organization
C) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
D) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Identity management involves

A) Identifying individuals and collecting data to determine access to resources
B) Providing security administrators with a single view of an individual's accounts and permissions across the entire organization
C) Maintaining records from which information is retrieved by identifying particulars assigned to the individual
D) Process of comparing each discovered identity to a master record of all individuals in the organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Federations are useful to

A) Authenticate users within an organization
B) Determine the authorizations of users to resources
C) Bridge authentication systems in separate organizations
D) Eliminate single points of failure in IT systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Kerberos has been very useful in securing corporate desktop infrastructures
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
OpenID uses an

A) Insecure model of authentication
B) Centralized model for authentication
C) Federated model for authentication
D) Distributed model for authentication
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Kerberos has been very useful in securing web applications
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
OAuth allows users to

A) Grant access to resources on one site to another site
B) Authenticate centrally
C) Authenticate using a federation
D) Authenticate using kerberos
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.