Assessment access cotrol

.docx

School

Wake Tech *

*We aren’t endorsed by this school

Course

275

Subject

Information Systems

Date

May 24, 2024

Type

docx

Pages

3

Uploaded by ProfEmu4418

Report
Assessment: access control Which of the following describes the online persona of a subject according to identity and access management principles? Digital identity  Which of the following is not part of the AAA identity and access management principles? Accessibility  Which of the AAA principles determines the actions allowed after a person has been both identified and authenticated? Authorization  Which of the AAA principles holds individuals responsible for actions on a system by providing audit logs for proof of an activity occurring on a device or network? Accountability  What term in identity and access management describes any active entity on a system meaning it is doing something? Subject  Which access control principle dictates that users have minimum permissions required to conduct the job duties within the organization? Least privilege  What is it called when an identity, or user, obtains access to systems and platforms over time because of job movement or responsibility changes? Authorization creep 
Which access control model describes the use of a single point of access control management for the organization? Centralized  What functional tool of access management allows multiple platforms and systems to use the same centralized management system for user identity authentication? Single sign-on  Which access control model describes administration of access controls that occur at the local level, usually taking place at the device level using local access control databases? Decentralized  Which primary access control model gives subjects, typically user identities, full control of objects, such as data, that they created or have been given access to? Discretionary access control  Which nondiscretionary access control model controls access to data and systems based on a user's role? Role-based access control  Which identity management protocol is commonly used in organizations that use an XML-based framework used to securely transmit authentication data between organizations? SAML  Which identity management protocol is a third-party authentication service that uses symmetric encryption and provides authentication for a variety of endpoints such as servers
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help