What are the 5 tasks of IAM?
Identity and Access Management (IAM):
- Create and deprovision accounts
- Manage accounts
- Audit accounts
- Evaluate identity-based threats
- Maintain compliance
What are the 5 subjects that can have user accounts?
What are the 5 types of factors for MFA?
What are the 8 most important types of authentication?
What are the 3 types of access control policies?
What are the 3 states of data?
What 4 security features does IPSec provide and how?
What are the 5 steps of the IPSec tunnel creation?
What is the Diffie-Hellman Key Exchange?
It allows two systems that dont know each other to excahnge keys and then trust each other. This happens by creating a shared secret key.
Whats the difference between Transport and Tunneling Mode in IPSec?
Transport Mode: Uses packets original IP header, best for Client-to-Site VPNs
Tunneling Mode: Encapsulates the entire packet and puts another header on it. Thats best for Site-to-Site VPNs.
What are the AH and ESP in IPSec?
The Authentication Header (AH) provides connectionless data integrity and protection against replay attacks.
The Encapsulating Security Payload (ESP) provides authentication, integrity, replay protection and data confidentiality.
What is PKI?
Public Key Infrastructure (PKI) is the system used to create Public/Private Key Pairs used in assymetric encryption.
What are self-signed certificates?
Certificates that are issued by the same person it validates, thus they dont give a lot of trust but are mostly used for encryption or personal use.