Assessment access cotrol
.docx
keyboard_arrow_up
School
Wake Tech *
*We aren’t endorsed by this school
Course
275
Subject
Information Systems
Date
May 24, 2024
Type
docx
Pages
3
Uploaded by ProfEmu4418
Assessment: access control
Which of the following describes
the online persona of a
subject according to identity and access management principles?
Digital identity
Which of the following is not part of the AAA identity and access management principles?
Accessibility
Which of the AAA principles
determines
the actions allowed after a person has been both
identified
and authenticated?
Authorization
Which of the AAA principles
holds individuals responsible for actions on a system by
providing
audit logs for proof of an activity
occurring on a device or network?
Accountability
What term in identity and access management describes any active entity on a system meaning it is doing something?
Subject
Which access control principle dictates that users have minimum permissions
required
to conduct the job duties within the organization?
Least privilege
What is it called when an identity, or user, obtains access to systems and platforms over time
because of
job movement or responsibility changes?
Authorization creep
Which access control model describes the use of a single point of access control management for the organization?
Centralized
What
functional tool of access management allows multiple platforms and systems to use the same centralized management system for user identity authentication?
Single sign-on
Which access control model describes administration of access controls
that
occur at the local level,
usually
taking place at the device level using local access control databases?
Decentralized
Which
primary
access control model
gives subjects, typically user identities, full control of objects, such as data, that they created or have
been given
access to?
Discretionary access control
Which
nondiscretionary
access control model
controls access to data and systems based on
a user's
role?
Role-based access control
Which identity management protocol
is commonly used
in organizations that use an XML-based framework used to securely
transmit
authentication data between organizations?
SAML
Which identity management protocol is a third-party authentication service that uses symmetric encryption and provides authentication for a variety of endpoints such as servers
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help