SecGov (B) Flashcards

(15 cards)

1
Q

Mechanisms for ______ and _______ play a critical part guaranteeing the integrity of system integration while also adhering to governance standards

A

authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can you apply to authentication and authorization in system integration?

A

OAuth 2.0 for API Authentication and Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An OAuth 2.0 is used to protect APIs by allowing users or applications to?

A

grant limited access to protected resources without sharing actual credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does OAuth 2.0 define to ensure secure and restricted access?

A

Resource owner, client and authorization server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What might you apply to a Role-Based Access Control (RBAC)?

A

RBAC for Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does RBAC for Access Control do within an integation system?

A

Control Access to Resources and Capabilities by defining rights associated with each role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is RBAC exemplified in healthcare?

A

Physicians have access to patient records while restricting same data from other staff members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is a token format that is small and self-contained and may be used for authentication and authorization

A

JSON Web Tokens (JWT) for Stateless Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In a JWT-based authentication architecture, they are used to authenticate and authorize users or services by?

A

Decoding claims to confirm their identity and granted access levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How might a JWT be applied in a mobile app?

A

App receives JWT after login and include it in all subsequent API requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Makes it possible to conduct safe authentication and authorization procedures across a number of different systems and organizations

A

Federated Identity Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What might be applied to a Federated Identity Management?

A

Single Sign-On (SSO) with SAML (Security Assertion Markup Language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Utilized for secure identity assertion and single sign-on, allowing users to log n once to access all supported systems

A

SAML (Security Assertion Markup Language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T or F
In a SSO with SAML, there is still need for multiple authentication steps, for better security, without re-entering credentials.

A

False. In an SSO with SAML, it eliminates the need for multiple authentication steps, providing seamless access to interconnected platforms without re-entering credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SAML may be used to implement SSO on an enterprise’s intranet if…

A

it integrates with multiple enterprise platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly