Authentication, Authorization, and Accounting

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

What are the five common factors of authentication?

Something you know (password, PIN)

Something you have (smart card, token, phone)

Something you are (biometrics like fingerprint)

Somewhere you are (geolocation/IP)

Something you do (typing patterns, signature)

2
New cards

What is the difference between authentication and authorization?

Authentication verifies who you are.

Authorization determines what you’re allowed to do.

3
New cards

What is multi-factor authentication (MFA)?

MFA is authentication that uses two or more factors from different categories, e.g., a password (something you know) and a fingerprint (something you are).

4
New cards

Give an example of two-factor authentication that is not multi-factor.

Using a password and a security question—both are something you know.

5
New cards

What is SSO and what is its benefit?

Single Sign-On (SSO) allows users to authenticate once and gain access to multiple systems without logging in again. It reduces password fatigue and increases efficiency.

6
New cards

What is Role-Based Access Control (RBAC)?

RBAC assigns permissions to users based on their job role. Example: HR has access to personnel files, IT has access to servers.

7
New cards

What is the difference between RBAC (Role Based Access Control) and ABAC (Attribute-Based Access Control)?

RBAC: Access is based on roles (e.g., Manager, Technician).

ABAC: Access is based on attributes, such as location, device, or time of day.

8
New cards

What principle ensures users only have the permissions needed to perform their job?

The Principle of Least Privilege.

9
New cards

What does the Separation of Duties principle prevent?

It reduces the risk of fraud by ensuring no one person has complete control over a sensitive process.

10
New cards

What type of control is used when access is granted based on security clearance levels?

Mandatory Access Control (MAC).

11
New cards

What does the Accounting component in AAA refer to?

Tracking user activity, such as logins, file access, and resource usage, often for auditing and security purposes.

12
New cards

What is the purpose of a log file in AAA?

It records events such as logins, commands run, and file changes, which can be used for auditing, troubleshooting, or incident response.

13
New cards

What tools or protocols support AAA functions?

RADIUS (Remote Authentication Dial-In User Service)

TACACS+ (Terminal Access Controller Access-Control System Plus)

Kerberos

14
New cards

Which AAA protocol encrypts only the password during transmission?

RADIUS

15
New cards

Which AAA protocol encrypts the entire communication session?

TACACS+