Which of the following BEST describes centralized identity management?
Answer : D
The description that best describes centralized identity management is that service providers perform as both the credential and identity provider (IdP). Identity management is a type of process that involves defining, verifying, and managing the identity or the information of the users or the entities that access or use a system or a network, or a service or an application, using various methods, such as credentials, identifiers, or attributes. Identity management can provide various benefits, such as enhancing the security, functionality, or usability of the system or the network, or of the service or the application, and ensuring the compliance or alignment with the standards or regulations. Identity management can be classified into various types, such as centralized, decentralized, or federated. Centralized identity management is a type of identity management that involves using or applying a single or a central authority or entity, such as a server or a database, to control and manage the identity or the information of the users or the entities, and to provide or grant the access or the authorization to the users or the entities, for accessing or using the system or the network, or the service or the application. Centralized identity management can provide various benefits, such as simplicity, consistency, or scalability. Centralized identity management can also include various roles or functions, such as:
Credential provider: The role or the function that involves creating and issuing the credentials, such as passwords, tokens, or certificates, to the users or the entities, for authenticating or verifying the identity or the information of the users or the entities, and for accessing or using the system or the network, or the service or the application.
Identity provider (IdP): The role or the function that involves storing and managing the identifiers, such as usernames, email addresses, or phone numbers, and the attributes, such as names, roles, or preferences, of the users or the entities, and providing or sharing the identifiers and the attributes of the users or the entities, with the system or the network, or with the service or the application, for identifying or recognizing the users or the entities, and for accessing or using the system or the network, or the service or the application.
Service provider: The role or the function that involves offering or delivering the system or the network, or the service or the application, to the users or the entities, and requesting or receiving the credentials, the identifiers, or the attributes of the users or the entities, from the credential provider or the identity provider, for authenticating, authorizing, or personalizing the users or the entities, and for accessing or using the system or the network, or the service or the application.
By carefully aligning the pins in the lock, which of the following defines the opening of a mechanical lock without the proper key?
Individuals have been identified and determined as having a need-to-know for the information. Which of the following access control methods MUST include a consistent set of rules for controlling and limiting access?
Answer : B
Role-Based Access Control (RBAC) is an access control method that assigns permissions to users based on their roles or functions within an organization. RBAC requires a consistent set of rules for controlling and limiting access, as each role is defined by a set of access rights that correspond to the level of authority and responsibility of the role. RBAC can simplify access management, enforce the principle of least privilege, improve security and compliance, and reduce administrative overhead. Reference:
Access Control Models and Methods
What Are the Different Types of Access Control?
3 Types of Access Control: IT Security Models Explained
In an organization where Network Access Control (NAC) has been deployed, a device trying to connect to the network is being placed into an isolated domain. What could be done on this device in order to obtain proper
connectivity?
Answer : B
Network Access Control (NAC) is a technology that enforces security policies and controls on the devices that attempt to access a network. NAC can verify the identity and compliance of the devices, and grant or deny access based on predefined rules and criteria. NAC can also place the devices into different domains or segments, depending on their security posture and role. One of the domains that NAC can create is the isolated domain, which is a restricted network segment that isolates the devices that do not meet the security requirements or pose a potential threat to the network. The devices in the isolated domain have limited or no access to the network resources, and are subject to remediation actions. Remediation is the process of fixing or improving the security status of the devices, by applying the necessary updates, patches, configurations, or software. Remediation can be performed automatically by the NAC system, or manually by the device owner or administrator. Therefore, the best thing that can be done on a device that is placed into an isolated domain by NAC is to apply remediation's according to the security requirements, which can restore the device's compliance and enable it to access the network normally.