Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Domain 4 Identity and Access Management

        Help!  

Term
Definition
Authentication Factors   Something you are, something you have, something you know, somewhere you are, something you do  
🗑
Physical Access Controls   biometrics, fingerprints, iris scans  
🗑
Identification   presenting credentials or keys  
🗑
TOTP   algorithm that relies on shared secret and moving factor or counter (Time-based One Time Password)  
🗑
HOTP   algorithm specifies an event-based OTP algorithm, where the moving factor is an event counter. The present work bases the moving factor on a time value. A time-based variant of the OTP algorithm provides short-lived OTP values  
🗑
Username & Password   most common form of authentication  
🗑
Password Lockout   prevents brute-force attacks  
🗑
Federation System   accounts in one area can be granted access rights to any other resource, whether local or remote within the domains  
🗑
Radius   provides authentication and authorization functions in addition to network access accounting functions - does not provide access control  
🗑
KERBEROS   supports mutual authentication, protecting against man-in-the-middle attacks  
🗑
PAP   Password Authentication Protocol - weak authentication - strongly discouraged  
🗑
OAUTH   provides authorization services, does not provide authentication such as Open ID and SAML  
🗑
SAML - Security Assertion Markup Language   an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider.  
🗑
IdP   source of username and password authenticates. SP provides service to user  
🗑
Access Controls   these include MAC, DAC, ABAC, RBAC  
🗑
CAC & PIV Cards   provide smar card functions for identity and authentication  
🗑
Disabled, not deleted   employees that leave should have their accounts _______________  
🗑
True   T/F Generic accounts used by multiple users should be prohibited - IE "Managers"  
🗑
Role Based or Role/Group Based   logical controls managing users  
🗑
TLS Technology using port 636   LDAP traffic can be made confidential and secure through:  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Popular Standardized Tests sets