Bash, the Crucial Exams Chat Bot
AI Bot

Access Control, Identity, and Endpoint Security (CCST) Flashcards

Cisco CCST Cybersecurity 100-160 Flashcards

Study our Access Control, Identity, and Endpoint Security (CCST) flashcards for the Cisco CCST Cybersecurity 100-160 exam with 35+ flashcards. View as flashcards, a searchable table, or as a fun matching game.
Cisco CCST Cybersecurity 100-160 Course Header Image
FrontBack
Compare signature based and behavior based anti malwareSignature based detects known malware by signatures Behavior based detects anomalies and unknown threats
Compare TOTP and HOTPTOTP is time based while HOTP is counter based
Define audit logging for access controlRecording authentication authorization and administrative events to support detection and forensics
Define authorization model RBACRole based access control assigns permissions to roles then roles to users
Define disk encryptionEncrypting data at rest on storage devices to protect confidentiality if the device is lost or stolen
Define SAMLSAML is an XML based standard for exchanging authentication and authorization data between parties
Define single sign on SSOA method that allows a user to authenticate once and access multiple services without reauthenticating
Describe endpoint hardeningApplying controls such as patching configuration management disabling unused services and restricting admin rights
Describe multi user device onboarding challengeEnsuring secure enrollment configuration and continuous compliance for many devices without manual intervention
Describe OAuth purposeDelegated authorization protocol that allows applications to act on a users behalf without sharing credentials
Explain 802.1XPort based network access control using EAP for authenticating devices to a network
Explain certificate based authenticationUses digital certificates to authenticate devices or users with cryptographic proof
Explain endpoint detection and response EDRTechnology that monitors endpoints for suspicious activity and enables investigation and response
Explain privileged access management PAMTools and processes to control monitor and audit elevated accounts and sessions
Explain separation of dutiesA control that divides critical tasks among multiple people to prevent fraud or error
Explain session management controlsMechanisms like timeouts reauthentication and token revocation to protect active sessions
Name the three authentication factorsKnowledge something you know Possession something you have Inherence something you are
What is a secure access token purposeUsed to prove authentication and authorization claims between services
What is a secure baseline configurationStandardized system settings implemented to reduce attack surface and ensure consistent security posture
What is account lockout policyPolicy that temporarily locks accounts after repeated failed authentication attempts to deter brute force attacks
What is application whitelistingAllowing only approved applications to run on endpoints to prevent unknown malware
What is authentication?Process of verifying that a user or device is who it claims to be
What is authorization?Process of determining what an authenticated user or device is allowed to do
What is behavioral biometricsUsing patterns like typing gait or mouse movements for continuous authentication
What is device quarantineIsolating non compliant devices and restricting their network access until remediation
What is least privilegePractice of granting users and processes the minimum access required to perform tasks
What is multifactor authentication MFAUse of two or more different authentication factors to increase assurance
What is network access control NACControls that evaluate devices before and during network access to enforce security policies
What is OpenID ConnectAn identity layer on top of OAuth used for federated authentication
What is patch managementProcess of identifying testing and deploying software updates to fix vulnerabilities
What is phishing resistant MFAAuthentication methods that cannot be bypassed by stolen credentials or phished one time codes such as FIDO2 hardware keys
What is posture assessmentEvaluation of device compliance with security policies before granting network access
What is risk based or adaptive authenticationAuthentication decisions that adjust required assurance based on context risk signals such as device location and behavior
What is role miningAnalyzing existing access to derive appropriate roles for RBAC implementation
What is zero trustA security model that requires continuous verification for every access request regardless of network location

About the Flashcards

Flashcards for the Cisco CCST Cybersecurity exam offer a focused review of modern identity and access management concepts tested on the certification. Students can quickly recall definitions of authentication, authorization, and the three authentication factors, then move on to multifactor techniques, single sign-on, zero trust, and secure session controls.

Beyond user identity, the deck drills into network and endpoint safeguards such as 802.1X, posture assessment, EDR, application whitelisting, and patch management. You'll also review authorization models like RBAC and least privilege, token standards including OAuth, OpenID Connect, and SAML, plus critical governance practices like audit logging, privileged access management, and account lockout policies.

Topics covered in this flashcard deck:

  • Authentication fundamentals
  • Multifactor and adaptive auth
  • Authorization & RBAC models
  • Network access control
  • Endpoint security hardening
  • Identity federation protocols
Share on...
Follow us on...