4: 2 Authentication Flashcards

1
Q

What are the three types of authenticators

A

Something you know, something you are, something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Something you know

A

Most popular i.e. passwords, security questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Something you are

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Something you have

A

Physical possession of device i.e. keyFOB, smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication Attributes

A

Weaker versions of the 3 main authenticators - somewhere you are, something you can do, someone know you, something you exhibit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FAR

A

False Acceptance Rate - misidentifies as an authorized user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FRR

A

False Rejection Rate - Fails to identify an authorized user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HOTP

A

HMAC-based One-Time Password - based on hardware tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TOTP

A

Time-based one time code - time of day with shared secret and only valid until the code works (both must have synched clocks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SMS and Phone-based authentication

A

Weaker than HOTP and TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Static Code

A

Becomes something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PAP

A

Password authentication protocol, not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CHAP

A

Challenge handshake authentication protocol - both server and user know password, challenge value sent from server to client. client merging the hash and value to create a value to send to the server. Server then computers hash itself and validates client’s response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MS-CHAP

A

Microsoft’s CHAP version, has been broken and is insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MS-CHAPv2

A

Microsoft’s second version of CHAP, has been broken and is insecure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Federated Identity Management

A

Individual has accounts across multiple systems that share identity information, reducing number of accounts needed (i.e. Facebook, Twitter logins)

17
Q

SSO

A

Single-Sign On - Shares authentication across systems so logins persist

18
Q

One Way Trust

A

Domain 1 trusts Domain 2, but D2 doesn’t trust D1

19
Q

Two Way Trust

A

D1 and D2 trust each other

20
Q

Transitive Trust

A

Trust Relationships that transfer across domains - automatically inferred

21
Q

Non-Transitive Trust

A

Trust relationships that do not transfer and aren’t automatically inferred

22
Q

RADIUS Protocols

A

Remote Access Dial In User Service - Centralized server could authenticate modem servers across the country

23
Q

Disadvantages of Radius

A

User Datagram Protocol is unreliable, and the entire sequence isn’t encrypted

24
Q

TACACS

A

Terminal Access Controller Access Control System

25
Q

TACACS+

A

Best version of access control similar to RADIUS but uses TCP (transmission control protocol) to fully encrypt authentication system

26
Q

Kerberos

A

Access Control that is core protocol of Microsoft Access Directory. Ticket based authentication system.

27
Q

What are the 4 parties in a Kerberos Access Request

A

End User - Authentication Server, Ticket Granting Server, Service

28
Q

LDAP

A

Lightweight Directory Access Protocol - Allows means to query a centralized directory service like Microsoft AD

29
Q

Kerberos Port

A

88

30
Q

LDAP Port

A

389

31
Q

Secure LDAP port

A

636

32
Q

NT LAN Manager

A

Old version of access protocol for windows that uses hashes, but weak encryption open to pass the hash vulnerability.

33
Q

SAML

A

Security Assertion Markup Language- allows browser based single sign-on.

34
Q

Who are the 3 parties in a SAML Request

A

Principal, Identity Provider, Service Provider

35
Q

OAuth, Open ID

A

Identity Protocols

36
Q

OpenID Connect

A

Authentication protocol that proves your identity

37
Q

OAuth

A

Authentication protocol that isn’t for authorization, brings you to a 3rd party OAuth login screen where correct authentication redirects you to the initial party screen.

38
Q

Certificate-based AUthentication

A

Users a public-private key pair to grant access, same strength as a password but can be automated.