501 Chapter 2 Flashcards

1
Q

____ proves identity with some type of credentials

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA stands for

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ work together with AAA to provide CAMS

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CAMS stand for

A

Comprehensive Access Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List five (5) authentication factors

A

Something you know, Something you are, Somewhere you are, Something you do, Something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

least secure of all authentication factors

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

credit card-sized embedded with microchip and certificate

A

smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PKI stands for

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ holds a user’s private key

A

Embedded Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is a specialized type of smartcard used by the US Department of Defense

A

CAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAC stands for

A

Common Access Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ is a specialized type of smartcard used by the US Federal agencies

A

PIV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PIV stands for

A

Personal Identification Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

sometimes called hardware tokens to differentiate them from logical or software tokens

A

fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

includes LCD display that changes periodically every 60 secs

A

fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HMAC stands for

A

Hash-based Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

____ is an open standard used for creating one-time passwords similar to those used in tokens and fobs

A

HOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HOTP stands for

A

HMAC-based One-Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ is similar to HOTP but it uses a timestamp instead of a counter

A

TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TOTP stands for

A

Time-based One-Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

____ is a network authentication mechanism used within Windows Active Directory domains and some Unix environments known as realms

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

three (3) factors for Kerberos to work

A

A method of issuing tickets, time synchronization, a database of subject or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

KDC stands for

A

Key Distribution Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

____ uses a complex process of issuing ticket-granting tickets (TGTs) and other tickets

A

KDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

requires all systems to be synchronized and within 5 minutes of each other

A

time synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

a suite of protocols provides authentication, integrity, confidentiality @Windows system,
uses a Message Digest hashing algorithm to challenge users and check their credentials

A

NTLM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

list the three versions of NTLM

A

NTLM
NTLMv2
NTLM2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

NTLM stands for

A

New Technology LAN Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

a simple MD4 hash of the user’s password

A

NTLM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

____ has been cracked and therefore NTLM is not recommended for use

A

MD4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

challenge-response authentication protocol,

creates HMAC-MD5 hash composed of a combination of username, logon domain name, user password, current time and more

A

NTLMv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

NTLMv2 + mutual authentication,

the client authenticates with server as well as server authenticates with the client

A

NTLM2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

____ is and extension of X.500 standard that Novell and early Microsoft exchange server used

A

LDAP

34
Q

____ uses encryption to protect LDAP transmissions

A

LDAPS

35
Q

LDAP stands for

A

Lightweight Directory Access Protocol

36
Q

LDAPS stands for

A

Lightweight Directory Access Protocol Secure

37
Q

when using LDAPS, client and server establishes a ____ session before transmission of data

A

TLS

38
Q

TLS stands for

A

Transport Layer Security

39
Q

____ refers to the ability of a user to log on or access multiple systems by providing credentials only once

A

SSO

40
Q

SSO stands for

A

Single Sign-On

41
Q

____ and ____ uses SSO capabilities

A

Kerberos and LDAP

42
Q

____ creates an indirect trust relationship

A

Transitive Trust

43
Q

____ is an XML (Extensible Markup Language) used to exchange authentication and authorization information between parties

A

SAML

44
Q

SAML stands for

A

Security Assertion Markup Language

45
Q

SAML as ____: users authenticate with one site are not required to authenticate to another

A

federated identity management system

46
Q

SAML three roles reqd:

A

principal, IdP, SP

47
Q

IdP stands for

A

Identity Provider

48
Q

SP stands for

A

Service Provider

49
Q

@SAML, ____ will authenticate a user so they can access other sites, thus Singe Sign-On is achieved

A

IdP

50
Q

@SAML, ____ is an entity that provides service to the principal

A

SP

51
Q

what is the primary purpose of SSO

A

identification and authentication of users

52
Q

____ is an open standard for authorization companies use to provide secure access to protected resources,

instead of creating accounts for each web site, you can use the same account only to AUTHORIZE it to do a particular thing

A

OAuth

53
Q

has “id_token” for signing in profiles

A

OpenID Connect

54
Q

it specifies that users are only granted what they need in order to properly perform: a janitor does not need CEO privileges to perform his function

A

principle of least privilege

55
Q

four account types:

A

end-user accounts,
privileged accounts,
guest accounts,
service accounts

56
Q

an account for regular users/standard user account

A

end-user account

57
Q

an account that has additional privileges than an end-user account

A

privileged account

58
Q

an account with limited access

A

guest account

59
Q

a regular account used by an application

A

service account

60
Q

specifies when users can log on to a computer. If a user connects the network outside the restricted time, the system denies access

A

time-of-day restrictions

61
Q

restrict access based on the location of the user

A

location-based policies

62
Q

a ____ is a collection of information that provides identity (like username) and proves the identity (like a password)

A

credential

63
Q

an access control model that uses role to manage rights and permissions for users

A

Role-based Access Control Model

64
Q

an access control model that uses rules like firewall and routers uses rules within the ACLs (Access Control Lists)

is based on a set of approved instructions

A

Rule-based Access Control Model

65
Q

ACL stands for

A

Access Control List

66
Q

an access control model where files and folders are “owned” the owner, by his discretion, will establish access to these objects

A

DAC

67
Q

DAC stands for

A

Discretionary Access Control

68
Q

NTFS stands for

A

New Technology File System

69
Q

SID stands for

A

Security Identifiers

70
Q

DACL stands for

A

Discretionary Access Control List

71
Q

____ is a list of ACE

A

DACL

72
Q

ACE stands for

A

Access Control Entities

73
Q

an access control model that uses labels: sensitivity labels or security labels to determine access

A

MAC

74
Q

MAC stands for

A

Mandatory Access Control

75
Q

____ is a matrix of labels

A

Lattice

76
Q

MAC is used when access is based on

A

need to know

77
Q

ABAC stands for

A

Attribute-Based Access Control

78
Q

Many SDNs use this access control model

A

ABAC

79
Q

SDN stands for

A

Software-Defined Network

80
Q

can be any characteristics of a user

A

Attribute