2.4 Authentication and Authorization Design Concepts Flashcards

1
Q

What is the best way to mitigate risks when using directory services in an application?

A

Use a single database

Each user should only have 1 set of credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Allows network access to other third-parties such as vendors, suppliers, etc. Third parties must establish a trust relationship with your network.

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Verification that hardware on your network actually belongs to you. Can be set up to send operational reports to your server and can be encrypted using the TPM.

A

attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are SMS authentication methods vulnerable to login attacks?

A

Phone numbers can be spoofed

SMS messages can be redirected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Involves receiving an authentication notification on your phone. More secure than SMS.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Psuedo-random token generator on your phone to provide MFA.

A

Authentication app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A secret key generator for authentication that uses a secret key plus the time of day. Timestamp is synced with an NTP server and increments every 30 seconds. Utilized by Google, Facebook, Microsoft, etc.

A

Time-based One-time Password algorithm (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication method that uses an encrypted key and a sequenced counter to generate a hashed one-time password.

A

HMAC (Keyed-Hash message authentication code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication factors that don’t change such as a PIN number.

A

Static code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the 7 most common biometric authentication factors used.

A

Fingerprint

Retinal

Iris

Voice

Facial

Gait

Vein Patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the crossover error rate (CER) of a biometric authentication method in regards to the sensitivity of the scan?

A

Where the false acceptance rate (FAR) and the False rejection rate (FRR) meet

Strikes balance between sensitivity and errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 3 A’s of the AAA framework?

A

Authentication - proof you are who you say you are

Authorization - your allowed access

Accounting - resource tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 MFA factors?

A

Something you know

Something you have

Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 4 MFA Attributes?

A

Somewhere you are

Something you can do

Something you exhibit

Someone you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Example:

Password

PIN

Pattern

A

something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Example:

smart card

usb token

your phone (sms codes)

A

something you have

17
Q

Example:

biometric authentication

mathematical storage of biometric data

A

Something you are

18
Q

Example:

IP address

GPS services

A

Somewhere you are

19
Q

Example:

handwriting analysis

unique characteristic

A

something you can do