Define password key
A physical device that must be plugged into a USB port to authenticate
Advantages of using a password vault (3)
How is HSM implemented for enterprise security?
Hardware-based device that provides centralized storage and management of all the keys used by an enterprise, can be used for encryption and to generate secrets or private keys
Define Knowledge based authentication (KBA)
Asks predefined question that only the true person would know or looks up data to ask a person
2 Types of KBA
Define PAP authentication (2)
Define CHAP (2)
Define MS-CHAP (2)
Name 3 secure authentication protocols used with PPTP
Define TACACS+ (2)
Define Kerberos (3)
Define Security Assertion Markup Language (SAML) (2)
Define 802.1X (3)
Define OAuth and OpenID
Define MAC model for access control (4)
Define DAC model for access control (2)
Define Role-based model for access control (2)
Define ABAC model for access control (2)
Define Rule-based Access Control
A generic term for access control where an administrator defines the rules for access to objects
Define conditional access model for access control (2)
Define Privileged access management (PAM) model for access control
A centralized digital vault is used and users checkout privileged access to systems/resources that is valid for a limited time