MFA stands for
Multi-Factor Authentication
RBAC stands for
Role-Based Access Control
An IAM policy
A set of rules defining access permissions.
What is the difference between DAC and MAC?
DAC allows owners to control access, MAC follows strict rules.
What is phishing?
A social engineering attack to steal credentials.
What is the most common form of authentication?
Password-based authentication
Which principle ensures users have only necessary permissions?
Principle of Least Privilege
Which cloud provider uses IAM policies extensively?
AWS, Azure, Google Cloud, etc.
What is an access control list (ACL)?
A list defining which users or systems can access a resource.
What is a brute force attack?
An attack that tries multiple password combinations.
Name a biometric authentication method.
Fingerprint, Face ID, Retina Scan, etc.
What is ABAC?
Attribute-Based Access Control
What language format are AWS IAM policies written in?
JSON
Which access control model is most flexible?
Discretionary Access Control (DAC)
What is credential stuffing?
Using leaked credentials from one site to access another.
What is the purpose of SSO?
Single Sign-On allows access to multiple services with one login.
What is the main difference between RBAC and ABAC?
RBAC assigns permissions based on roles, while ABAC considers attributes.
What are the three fundamental components of an IAM policy?
Authentication, Authorization, Administration, and Auditing and Reporting
What type of control is a password policy?
Preventative control
What does the term 'Zero Trust' mean?
Never trust, always verify; assume breach.
What protocol is commonly used for federated authentication?
SAML (Security Assertion Markup Language)
Which model uses security labels for access?
Mandatory Access Control (MAC)
What happens when a policy explicitly denies access?
Denial takes precedence over allow rules.
What access control is used in military systems?
Mandatory Access Control (MAC)
What is an insider threat?
A security risk posed by someone within the organization.