2 cissp ® Official Study Guide Eighth Edition


D. Sending thousands of emails to a single address 20



Download 19,3 Mb.
Pdf ko'rish
bet537/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   533   534   535   536   537   538   539   540   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

D.
Sending thousands of emails to a single address
20.
What authentication protocol offers no encryption or protection for logon credentials?
A.
PAP
B.
CHAP
C.
SSL
D.
RADIUS



Chapter 
13
Managing Identity 
and Authentication
The CISSP exAM ToPICS Covered In 
ThIS ChAPTer InClude:

Domain 5: Identity and Access Management (IAM)

5.1 Control physical and logical access to assets

5.1.1 Information

5.1.2 Systems

5.1.3 Devices

5.1.4 Facilities

5.2 Manage identification and authentication of people, 
devices, and services

5.2.1 Identity management implementation

5.2.2 Single/multi-factor authentication

5.2.3 Accountability

5.2.4 Session management

5.2.5 Registration and proofing of identity

5.2.6 Federated Identity Management (FIM)

5.2.7 Credential management systems

5.3 Integrate identity as a third-party service

5.3.1 On-premise

5.3.2 Cloud

5.3.3 Federated

5.5 Manage the identity and access provisioning lifecycle

User access review

System account access review

Provisioning and deprovisioning


The Identity and Access Management (IAM) domain focuses 
on issues related to granting and revoking privileges to access 
data or perform actions on systems. A primary focus is on 
identification, authentication, authorization, and accountability. In this chapter and in 
Chapter 14, “Controlling and Monitoring Access,” we discuss all the objectives within the 
Identity and Access Management domain. Be sure to read and study the materials from 
both chapters to ensure complete coverage of the essential material for this domain.
Controlling Access to Assets
Controlling access to assets is one of the central themes of security, and you’ll find that 
many different security controls work together to provide access control. An asset includes 
information, systems, devices, facilities, and personnel.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   533   534   535   536   537   538   539   540   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish