3.8 Authentication & Authorization Flashcards

1
Q

Define password key

A

A physical device that must be plugged into a USB port to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Advantages of using a password vault (3)

A
  1. More secure to have multiple passwords to access different services than a single password SSO
  2. Vault is encrypted to harden access in case it is compromised
  3. Portable - users can access it from nearly any location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is HSM implemented for enterprise security?

A

Hardware-based device that provides centralized storage and management of all the keys used by an enterprise, can be used for encryption and to generate secrets or private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Knowledge based authentication (KBA)

A

Asks predefined question that only the true person would know or looks up data to ask a person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 Types of KBA

A
  1. Static - a preconfigured question/answer
  2. Asks questions based on public or private information, such as what was the street number of house you lived in previously
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define PAP authentication (2)

A
  1. Password authentication protocol
  2. No encryption - plaintext
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define CHAP (2)

A
  1. Challenge Handshake Authentication Protocol
  2. Encrypted authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define MS-CHAP (2)

A
  1. Microsoft’s CHAP implementation
  2. MS-CHAP & MS-CHAP V2 should not be used due to weak encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name 3 secure authentication protocols used with PPTP

A
  1. L2TP
  2. IPsec
  3. 802.1X
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define TACACS+ (2)

A
  1. Terminal Controller Access-Control System
  2. AAA alternative to RADIUS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Kerberos (3)

A
  1. Most complex and robust AAA
  2. Provides SSO capabilities
  3. Uses mutual authentication between client & server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Security Assertion Markup Language (SAML) (2)

A
  1. Provides both authentication and authorization
  2. Third-party (Federated) authentication & authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define 802.1X (3)

A
  1. Network Access Control - authenticates access to use network
  2. Commonly integrated with EAP
  3. Commonly used for wireless networks, but can be used for wired as well
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define OAuth and OpenID

A
  1. Typically used in conjunction
  2. OpenID provides authentication and OAuth provides authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define MAC model for access control (4)

A
  1. Mandatory Access Control
  2. Separate security levels are configured and then all objects are assigned a security level
  3. Users are all assigned a security level and can access objects at or below their security level
  4. Common in highly secured organizations or government
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define DAC model for access control (2)

A
  1. Discretionary access control
  2. The user who creates an object is the owner of that object and assigns rights and permissions to it
17
Q

Define Role-based model for access control (2)

A
  1. Commonly used in large organizations
  2. Admins assign users to roles and roles are assigned permissions
18
Q

Define ABAC model for access control (2)

A
  1. Attribute-based Access Control
  2. Various attributes are used to determine access to resources, such as time of day, source IP address, etc
19
Q

Define Rule-based Access Control

A

A generic term for access control where an administrator defines the rules for access to objects

20
Q

Define conditional access model for access control (2)

A
  1. Used in cloud-based systems
  2. Evaluates a variety of conditions to determine if access to services is allowed
21
Q

Define Privileged access management (PAM) model for access control

A

A centralized digital vault is used and users checkout privileged access to systems/resources that is valid for a limited time