Bash, the Crucial Exams Chat Bot
AI Bot

ISC2 CISSP - Identity and Access Management (IAM)  Flashcards

ISC2 CISSP Flashcards

FrontBack
Challenges of password-based authenticationVulnerable to guesswork, brute-force attacks, and poor user management practices.
Difference between DAC and MACDiscretionary Access Control allows data owners to set permissions, Mandatory Access Control enforces permissions based on policies.
Key components of IAMIdentification, Authentication, Authorization, Accountability.
Purpose of access control mechanismsTo restrict and manage user access to resources based on policies.
Types of authentication factorsKnowledge (something you know), Possession (something you have), Inherence (something you are), Location, Behavior.
What does AAA stand for in securityAuthentication, Authorization, and Accounting.
What does SSO stand forSingle Sign-On.
What is ABACAttribute-Based Access Control, assigns access based on attributes like user, resource, or environment.
What is an access control list (ACL)A list defining the permissions for various users or systems to access a resource.
What is authenticationThe process of verifying the identity of a user or system.
What is authorizationThe process of determining access rights and permissions for an authenticated user.
What is cookie-based session managementUsing cookies to maintain state and memory of user sessions.
What is de-provisioningThe process of removing access and disabling accounts when no longer needed.
What is identity federationLinking a user's digital identity across multiple systems or organizations.
What is identity proofingThe process of verifying identity during enrollment or account creation.
What is Just-In-Time (JIT) accessProviding temporary access to resources as needed for specific tasks.
What is KerberosA network authentication protocol using tickets to securely manage credentials.
What is LDAPLightweight Directory Access Protocol, used to access and manage directory information.
What is MFAMultifactor Authentication - using two or more factors for authentication.
What is provisioningThe process of creating and enabling user accounts and access rights.
What is proximity-based authenticationAuthentication using physical closeness, often via tokens or smart cards.
What is RBACRole-Based Access Control, assigns access based on roles within an organization.
What is the goal of Identity GovernanceTo ensure identities are managed properly and comply with policies.
What is the principle of least privilegeGrant users only the access necessary to perform their job functions.
What is the purpose of a digital certificateTo verify identity and establish trust, often in PKI systems.
What is the purpose of a directory serviceTo store and manage information about users and resources in a network.
This deck covers authentication, authorization, identity governance, and access control mechanisms used to protect resources.
Share on...
Follow us on...