Authentication Methods
Multifactor Authentication
Federation & Identity Providers
Account Management
Access Control Schemes
100

What is a password?

This is the most common means of authentication, but it can be stolen and is susceptible to brute-force attacks.

100

What are authentication types?

SFA requires only one type of authentication factors.
MFA requires at least this many different types of authentication factors.

100

What is an Identity Provider (IdP)?

This type of organization manages the lifecycle of digital identities and handles authentication.

100

What is provisioning (or onboarding)?

This process creates user accounts and assigns resources, permissions, and attributes.

100

What is least privilege?

This principle states that accounts should only receive the minimum permissions necessary for their role.

200

What is length?

This NIST recommendation emphasizes this characteristic of passwords over complexity requirements.

200

What is "something you have"?

This factor category includes smartcards, USB tokens, and security keys.

200

What are Service Providers (SPs) or Relying Parties (RPs)?

These entities provide services to users whose identities have been attested to by an IdP.

200

What is deprovisioning?

This process removes accounts, permissions, and related data when they're no longer needed.

200

What is Discretionary Access Control (DAC)?

In this access control scheme, file owners can delegate rights and permissions as they desire.

300

What are biometric factors (or something you are)?

These authentication factors include fingerprints, retina scans, and voice prints.

300

What is Time-Based One-Time Password?

TOTP stands for this type of one-time password generation method. Examples include Google and Microsoft Authenticators

300

What is attestation?

This formal verification confirms that something is true, such as a user being who they claim to be.

300

What is permission creep?

This occurs when users accumulate broader permissions over time that may not match their current role.

300

What is Mandatory Access Control (MAC)?

This access control relies on the operating system to enforce controls set by a security policy administrator.

400

What is passwordless authentication?

This type of authentication uses hardware devices like security keys and eliminates the need for passwords entirely.

400

What is FRR (False Rejection Rate)?

This is the false rejection rate in biometric systems, also called a Type I error.

400

What are SAML and OpenID Connect?

These two protocols are commonly used for federated authentication in cloud environments

400

What are ephemeral accounts?

These temporary accounts have limited lifespans and are often used for guests or specific purposes.

400

What is Role-Based Access Control (RBAC)?

This access control system uses job functions matched with appropriate privileges and permissions.

500

What is FIDO2?

This standard uses key pairs and supports both W3C Web Authentication and CTAP protocol.

500

What is MFA fatigue (or push notification bombing)?

This attack method overwhelms users with repeated validation requests until they enter an OTP to make requests stop.

500

What is OAuth?

This protocol is specifically used to handle authorization of access to protected resources in federated systems.

500

What is Just-in-Time (JIT) permissions?

This PAM feature grants and revokes permissions only when needed, requiring users to "check out" access.

500

What is Attribute-Based Access Control (ABAC)?

This flexible access control scheme uses policies driven by user characteristics and can create complex rulesets.

M
e
n
u