Authentication
Access Control
Single Sign-On
Account Management
Permissions
100

The most common type of user authentication 

What is a password?

100

Access control method in which rights are assigned to a role instead of manually to each individual user. 

role-based access control (RBAC) 

100

Agreement between a group of organizations to allow subscribers to use one set of credentials to access all networks belonging to the organizations in the group. 

federated identity management (FIM) 

100

Microsoft technology is used to govern security by limiting what a standard user is able to do on a system. 

user account control (UAC) 

100

Permissions that determine the level of access to a given file or folder for other network users. 

What is share permissions?

200

Factor of authentication for tokens, access card

What you have?

200

Control strategy in which user access is determined by a set of rules established by an administrator. 

rule-based access control 

200

Open standard that allows the exchange of authentication and authorization information to provide SSO options over the Internet with federated systems. 

Security Assertion Markup Language (SAML) 

200

Employees are given only the privileges needed to perform their job responsibilities. 

What is the least privilege?

200

Permissions are used to manage access to folders, files, or resources stored on Windows NT-based system. 

New Technology File System (NTFS) permissions 

300

Factor of biometrics

What you are?

300

Security strategy that sets a strict level of access to resources based on criteria set by a network administrator. 

What is mandatory access control (MAC)?

300

Open-source project that provides single sign-on and allows websites to make authorization decisions on an individual level. 

What is Shibboleth?

300

Examination, assessment, or evaluation of an account. 

What is account audit?

300

Permissions given to a user to access a specific folder, file, or network drive. 

explicit permissions 

400

Attributes of location

What is "Somewhere you are"?

400

Access control method in which a user can be granted additional rights to data beyond what is allowed by the individual’s assigned access level. 

discretionary access control (DAC) 

400

An open standard for single sign-on, but it does not provide authentication services; instead, it issues access to third-party clients through an authorization server. 

What is OAuth?

400

Contains not only the local user account names but also passwords stored in a hashed format. 

Security Account Manager (SAM)

400

Permissions a user receives by default when a child of a parent object if created. 

inherited permissions 

500

Attributes of authentication based on the speed of keystrokes, common errors, etc.

What is "Something You Can Do"?

500

Access control system that uses attributes or characteristics assigned to a user and compares them to attributes or characteristics that are assigned to the data. 

attribute-based access control (ABAC) 

500

Open standard authentication protocol that supports single sign-on focuses on allowing data access by providing authentication services. 

What is Open ID Connect?

500

Standard authentication protocol on all versions of Microsoft Server when using the Active Directory. 

What is Kerberos?

500

Permissions a user receives through another object, such as a group. 

implicit permissions 

M
e
n
u