2.4 Flashcards

Summarize authentication and authorization design concepts.

1
Q

These are techniques or processes used to verify the identity of users or entities accessing a system or network. Examples include passwords, biometrics, tokens, and certificates.

A

Authentication methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are centralized databases that store and manage information about users, devices, and resources within a network. They facilitate authentication, access control, and resource management.

A

Directory Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Defines policies, protocols, and practices to manage identities across systems and organizations.

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is the supplying of proof or evidence of some fact.

A

Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of password algorithm that generates temporary authentication codes based on the current time and a shared secret. These codes expire after a short period, enhancing security compared to static passwords.

A

Time-based one-time password (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Type of password algorithm that uses a counter value and a shared secret to generate authentication codes. Each code is valid only once, providing an additional layer of security.

A

HMAC-based one-time password (HOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Are physical devices that carry a digital token used to identify the user.

A

Token key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Codes that do not change or are static in nature.

A

Static codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Are messages sent from a server to a user’s device to prompt authentication or authorization actions.

A

Push notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Involves using a physical card embedded with a microprocessor and cryptographic capabilities to authenticate users.

A

Smart card authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Involves using unique physiological or behavioral characteristics, such as fingerprints, iris patterns, or voiceprints, to verify a person’s identity.

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Measure the effectiveness of authentication systems in accurately verifying users’ identities. They include metrics such as accuracy, speed, and user acceptance.

A

Efficacy rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Occurs when an authentication system incorrectly identifies an unauthorized user as an authorized one, granting access to protected resources.

A

False acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Occurs when an authentication system incorrectly denies access to an authorized user, typically due to errors or inconsistencies in the authentication process.

A

False rejection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is the point at which both acceptance and rejection error rates are equal.

A

Crossover error rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What you are, what you have, what you know, somewhere you are, and something you do.

A

Multifactor authentication (MFA) factors and attributes

17
Q

Is a framework for controlling access to resources and tracking user activities within a network. It encompasses authentication (verifying identities), authorization (granting or denying access), and accounting (logging and monitoring user actions).

A

Authentication, authorization, and accounting (AAA)