1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the five common factors of authentication?
Something you know (password, PIN)
Something you have (smart card, token, phone)
Something you are (biometrics like fingerprint)
Somewhere you are (geolocation/IP)
Something you do (typing patterns, signature)
What is the difference between authentication and authorization?
Authentication verifies who you are.
Authorization determines what you’re allowed to do.
What is multi-factor authentication (MFA)?
MFA is authentication that uses two or more factors from different categories, e.g., a password (something you know) and a fingerprint (something you are).
Give an example of two-factor authentication that is not multi-factor.
Using a password and a security question—both are something you know.
What is SSO and what is its benefit?
Single Sign-On (SSO) allows users to authenticate once and gain access to multiple systems without logging in again. It reduces password fatigue and increases efficiency.
What is Role-Based Access Control (RBAC)?
RBAC assigns permissions to users based on their job role. Example: HR has access to personnel files, IT has access to servers.
What is the difference between RBAC (Role Based Access Control) and ABAC (Attribute-Based Access Control)?
RBAC: Access is based on roles (e.g., Manager, Technician).
ABAC: Access is based on attributes, such as location, device, or time of day.
What principle ensures users only have the permissions needed to perform their job?
The Principle of Least Privilege.
What does the Separation of Duties principle prevent?
It reduces the risk of fraud by ensuring no one person has complete control over a sensitive process.
What type of control is used when access is granted based on security clearance levels?
Mandatory Access Control (MAC).
What does the Accounting component in AAA refer to?
Tracking user activity, such as logins, file access, and resource usage, often for auditing and security purposes.
What is the purpose of a log file in AAA?
It records events such as logins, commands run, and file changes, which can be used for auditing, troubleshooting, or incident response.
What tools or protocols support AAA functions?
RADIUS (Remote Authentication Dial-In User Service)
TACACS+ (Terminal Access Controller Access-Control System Plus)
Kerberos
Which AAA protocol encrypts only the password during transmission?
RADIUS
Which AAA protocol encrypts the entire communication session?
TACACS+