Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

Authentication and Authorization

Puntuación
-
Vendido
-
Páginas
28
Grado
A+
Subido en
17-02-2025
Escrito en
2024/2025

________ takes place when you are presenting credentials to a system to indicate exactly who you are with respect to the system ANSWER Identification _______, also called authenticators, are the pieces of information you present to the system to assert your identity ANSWER Credentials _______ is the process of verifying that the credentials presented are valid and that they do indeed belong to a user authorized to access the system. ANSWER Authentication The credentials are validated against a database of user credentials, and if those credentials match, the user is allowed to access the system and is said to be ______________. ANSWER authenticated ______________ covers the rights, permissions, and privileges that a user has only after he has been successfully authenticated to a system ANSWER Authorization What are the authentication factors? ANSWER 1) Something You Know 2) Something You Have 3) Something You Are 4) Something You Do 5) Somewhere You Are

Mostrar más Leer menos
Institución
Authentication
Grado
Authentication

Vista previa del contenido

Authentication and Authorization
________ takes place when you are presenting credentials to a system to indicate exactly who
you are with respect to the system
ANSWER Identification


_______, also called authenticators, are the pieces of information you present to the system to
assert your identity
ANSWER Credentials


_______ is the process of verifying that the credentials presented are valid and that they do
indeed belong to a user authorized to access the system.
ANSWER Authentication


The credentials are validated against a database of user credentials, and if those credentials
match, the user is allowed to access the system and is said to be ______________.
ANSWER authenticated


______________ covers the rights, permissions, and privileges that a user has only after he has
been successfully authenticated to a system
ANSWER Authorization


What are the authentication factors?
ANSWER 1) Something You Know
2) Something You Have
3) Something You Are
4) Something You Do
5) Somewhere You Are

,What is the the most common example of multifactor authentication?
ANSWER The use of smart cards and PIN combinations


What is a false rejection rate?
ANSWER - also known as a type I error.
- relates to the error caused from rejecting someone who is in fact an authorized user and
should be authenticated in a biometric system


What is a false acceptance rate?
ANSWER - type II error
- indicates the level of errors that the system may generate indicating that unauthorized users
are actually identified and authenticated as valid users in a biometric system


crossover error rate
ANSWER the point at which the system must be tuned to reduce both types of errors
effectively without increasing either one of them


transitive trust
ANSWER A transitive trust usually means that the organization trusts another entity simply
because they are trusted by someone else that the organization trusts


federated system
ANSWER A federated system involves the use of a common authentication system and
credentials database that multiple entities use and share.


This ensures that a user's credentials in Company A would be acceptable in Company B and
Company C, and only access permissions would be the determining factor in accessing systems
and data.

, Windows Active Directory is a good example of a federated system in practice; user credentials
from different domains could be used in other domains if they are all part of the same Active
Directory forest.


Authorization
ANSWER - the process of determining who gets what type of access to systems and data
- part of an access control policy, which relates to how the organization determines who gets
access to what systems and data based upon the sensitivity of those systems and data


access control policy
ANSWER - dictates how an organization handles its authorization processes
- Data sensitivity policies also dictate authorization
- organization's stance on the principle of least privilege, how duties are separated and divided
among key personnel


principle of least privilege
ANSWER - granting only the level of access someone needs to do her job, and no more than
that
- a person should get the minimum access to systems and data required to complete her daily
duties
- applies not only to being able to view and interact with data; it also applies to actions users
can take with respect to the system and the network


separation of duties
ANSWER - involves dividing up critical or security-related tasks and responsibilities among
two or more individuals, rather than allowing one individual to perform an excessive number of
powerful tasks
- When implemented, critical or security-related tasks can't all be performed by one individual
without checks and balances from other individuals

Escuela, estudio y materia

Institución
Authentication
Grado
Authentication

Información del documento

Subido en
17 de febrero de 2025
Número de páginas
28
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$11.49
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
Ivuti

Conoce al vendedor

Seller avatar
Ivuti Oxford University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
-
Miembro desde
1 año
Número de seguidores
0
Documentos
46
Última venta
-
EXAMS ( QUESTIONS AND ANSWERS)

“Hey, students! Struggling to keep up with coursework? Check out my Stuvia store for reliable, high-quality study materials. From detailed summaries to exam prep guides, everything you need is just a click away. Start studying smarter today!”

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes