501 Chapter 2 Flashcards

1
Q

____ proves identity with some type of credentials

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA stands for

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ work together with AAA to provide CAMS

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CAMS stand for

A

Comprehensive Access Management System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List five (5) authentication factors

A

Something you know, Something you are, Somewhere you are, Something you do, Something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

least secure of all authentication factors

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

credit card-sized embedded with microchip and certificate

A

smart card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PKI stands for

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ holds a user’s private key

A

Embedded Certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is a specialized type of smartcard used by the US Department of Defense

A

CAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAC stands for

A

Common Access Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ is a specialized type of smartcard used by the US Federal agencies

A

PIV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PIV stands for

A

Personal Identification Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

sometimes called hardware tokens to differentiate them from logical or software tokens

A

fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

includes LCD display that changes periodically every 60 secs

A

fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HMAC stands for

A

Hash-based Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

____ is an open standard used for creating one-time passwords similar to those used in tokens and fobs

A

HOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

HOTP stands for

A

HMAC-based One-Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ is similar to HOTP but it uses a timestamp instead of a counter

A

TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TOTP stands for

A

Time-based One-Time Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

____ is a network authentication mechanism used within Windows Active Directory domains and some Unix environments known as realms

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

three (3) factors for Kerberos to work

A

A method of issuing tickets, time synchronization, a database of subject or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

KDC stands for

A

Key Distribution Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

____ uses a complex process of issuing ticket-granting tickets (TGTs) and other tickets

A

KDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
requires all systems to be synchronized and within 5 minutes of each other
time synchronization
26
a suite of protocols provides authentication, integrity, confidentiality @Windows system, uses a Message Digest hashing algorithm to challenge users and check their credentials
NTLM
27
list the three versions of NTLM
NTLM NTLMv2 NTLM2
28
NTLM stands for
New Technology LAN Manager
29
a simple MD4 hash of the user's password
NTLM
30
____ has been cracked and therefore NTLM is not recommended for use
MD4
31
challenge-response authentication protocol, | creates HMAC-MD5 hash composed of a combination of username, logon domain name, user password, current time and more
NTLMv2
32
NTLMv2 + mutual authentication, | the client authenticates with server as well as server authenticates with the client
NTLM2
33
____ is and extension of X.500 standard that Novell and early Microsoft exchange server used
LDAP
34
____ uses encryption to protect LDAP transmissions
LDAPS
35
LDAP stands for
Lightweight Directory Access Protocol
36
LDAPS stands for
Lightweight Directory Access Protocol Secure
37
when using LDAPS, client and server establishes a ____ session before transmission of data
TLS
38
TLS stands for
Transport Layer Security
39
____ refers to the ability of a user to log on or access multiple systems by providing credentials only once
SSO
40
SSO stands for
Single Sign-On
41
____ and ____ uses SSO capabilities
Kerberos and LDAP
42
____ creates an indirect trust relationship
Transitive Trust
43
____ is an XML (Extensible Markup Language) used to exchange authentication and authorization information between parties
SAML
44
SAML stands for
Security Assertion Markup Language
45
SAML as ____: users authenticate with one site are not required to authenticate to another
federated identity management system
46
SAML three roles reqd:
principal, IdP, SP
47
IdP stands for
Identity Provider
48
SP stands for
Service Provider
49
@SAML, ____ will authenticate a user so they can access other sites, thus Singe Sign-On is achieved
IdP
50
@SAML, ____ is an entity that provides service to the principal
SP
51
what is the primary purpose of SSO
identification and authentication of users
52
____ is an open standard for authorization companies use to provide secure access to protected resources, instead of creating accounts for each web site, you can use the same account only to AUTHORIZE it to do a particular thing
OAuth
53
has "id_token" for signing in profiles
OpenID Connect
54
it specifies that users are only granted what they need in order to properly perform: a janitor does not need CEO privileges to perform his function
principle of least privilege
55
four account types:
end-user accounts, privileged accounts, guest accounts, service accounts
56
an account for regular users/standard user account
end-user account
57
an account that has additional privileges than an end-user account
privileged account
58
an account with limited access
guest account
59
a regular account used by an application
service account
60
specifies when users can log on to a computer. If a user connects the network outside the restricted time, the system denies access
time-of-day restrictions
61
restrict access based on the location of the user
location-based policies
62
a ____ is a collection of information that provides identity (like username) and proves the identity (like a password)
credential
63
an access control model that uses role to manage rights and permissions for users
Role-based Access Control Model
64
an access control model that uses rules like firewall and routers uses rules within the ACLs (Access Control Lists) is based on a set of approved instructions
Rule-based Access Control Model
65
ACL stands for
Access Control List
66
an access control model where files and folders are "owned" the owner, by his discretion, will establish access to these objects
DAC
67
DAC stands for
Discretionary Access Control
68
NTFS stands for
New Technology File System
69
SID stands for
Security Identifiers
70
DACL stands for
Discretionary Access Control List
71
____ is a list of ACE
DACL
72
ACE stands for
Access Control Entities
73
an access control model that uses labels: sensitivity labels or security labels to determine access
MAC
74
MAC stands for
Mandatory Access Control
75
____ is a matrix of labels
Lattice
76
MAC is used when access is based on
need to know
77
ABAC stands for
Attribute-Based Access Control
78
Many SDNs use this access control model
ABAC
79
SDN stands for
Software-Defined Network
80
can be any characteristics of a user
Attribute