Deck 8: Identity and Access Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 8: Identity and Access Management
1
Identity discovery involves
A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
A
2
A distinct record in a system of record is called an
A) Password
B) Username
C) Identity
D) Account
A) Password
B) Username
C) Identity
D) Account
Identity
3
Identity reconciliation involves
A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
B
4
A person registry
A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
C) Is the process of comparing each discovered identity to a master record of all individuals in the organization
D) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
C) Is the process of comparing each discovered identity to a master record of all individuals in the organization
D) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
For use as a biomarker, a physical trait must be
A) Searchable
B) Universal
C) Attractive
D) Inexpensive
A) Searchable
B) Universal
C) Attractive
D) Inexpensive
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Authentication is
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Hardware or software tokens are used for
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The minute differences in physical traits used to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The minute differences in physical traits used to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Password synchronization technologies
A) Require the presentation of a token for authentication
B) Allow a user to authenticate once and obtain access to all authorized resources
C) Allow nodes in an insecure network to securely identify themselves to each other using tokens
D) Ensure that the user has the same username and password on all systems
A) Require the presentation of a token for authentication
B) Allow a user to authenticate once and obtain access to all authorized resources
C) Allow nodes in an insecure network to securely identify themselves to each other using tokens
D) Ensure that the user has the same username and password on all systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Biometrics is
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
A password is
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
A system of record is
A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Records from which information is retrieved by identifying particulars assigned to the individual
C) Process of comparing each discovered identity to a master record of all individuals in the organization
D) Central hub that connects identifiers from all Systems of Records into a single "master" identity
A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Records from which information is retrieved by identifying particulars assigned to the individual
C) Process of comparing each discovered identity to a master record of all individuals in the organization
D) Central hub that connects identifiers from all Systems of Records into a single "master" identity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
The stages in identity management are
A) Denial, anger, bargaining, acceptance
B) Plan, do, check, act
C) Plan, acquire, deploy, manage
D) Discovery, reconciliation and enrichment
A) Denial, anger, bargaining, acceptance
B) Plan, do, check, act
C) Plan, acquire, deploy, manage
D) Discovery, reconciliation and enrichment
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Access management involves
A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Making decisions about granting users access to resources
D) Collecting data about each individual's relationship to the organization
A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Making decisions about granting users access to resources
D) Collecting data about each individual's relationship to the organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Kerberos is
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Match/ merge is an industry term for
A) Identity reconciliation
B) Identity discovery
C) Identity enrichment
D) Access control
A) Identity reconciliation
B) Identity discovery
C) Identity enrichment
D) Access control
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
Identity enrichment involves
A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
An individual's affiliation with the organization is called their
A) Access
B) Role
C) Account
D) Password
A) Access
B) Role
C) Account
D) Password
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Single sign-on technologies
A) Ensure that the user has the same username and password on all systems
B) Have no single point of failure
C) Allow a user to authenticate once and obtain access to all authorized resources
D) Allow nodes in an insecure network to securely identify themselves to each other using tokens
A) Ensure that the user has the same username and password on all systems
B) Have no single point of failure
C) Allow a user to authenticate once and obtain access to all authorized resources
D) Allow nodes in an insecure network to securely identify themselves to each other using tokens
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
The access registry
A) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
B) Is the process of comparing each discovered identity to a master record of all individuals in the organization
C) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
D) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
A) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
B) Is the process of comparing each discovered identity to a master record of all individuals in the organization
C) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
D) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Identity management involves
A) Identifying individuals and collecting data to determine access to resources
B) Providing security administrators with a single view of an individual's accounts and permissions across the entire organization
C) Maintaining records from which information is retrieved by identifying particulars assigned to the individual
D) Process of comparing each discovered identity to a master record of all individuals in the organization
A) Identifying individuals and collecting data to determine access to resources
B) Providing security administrators with a single view of an individual's accounts and permissions across the entire organization
C) Maintaining records from which information is retrieved by identifying particulars assigned to the individual
D) Process of comparing each discovered identity to a master record of all individuals in the organization
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Federations are useful to
A) Authenticate users within an organization
B) Determine the authorizations of users to resources
C) Bridge authentication systems in separate organizations
D) Eliminate single points of failure in IT systems
A) Authenticate users within an organization
B) Determine the authorizations of users to resources
C) Bridge authentication systems in separate organizations
D) Eliminate single points of failure in IT systems
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Kerberos has been very useful in securing corporate desktop infrastructures
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
OpenID uses an
A) Insecure model of authentication
B) Centralized model for authentication
C) Federated model for authentication
D) Distributed model for authentication
A) Insecure model of authentication
B) Centralized model for authentication
C) Federated model for authentication
D) Distributed model for authentication
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Kerberos has been very useful in securing web applications
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
OAuth allows users to
A) Grant access to resources on one site to another site
B) Authenticate centrally
C) Authenticate using a federation
D) Authenticate using kerberos
A) Grant access to resources on one site to another site
B) Authenticate centrally
C) Authenticate using a federation
D) Authenticate using kerberos
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck