Authentication Flashcards
Which authentication protocol is used by Microsoft Active Directory Domain Services?
802.1x
Kerberos
RADIUS
Kerberos
The Kerberos network authentication protocol is used by Microsoft Active Directory Domain Services (AD DS)
Your organization requires a method for desktop computers to verify that the machine boots only with trusted operating systems. Which firmware components must be present to meet this requirement? (Choose two.)
EAP
HSM
UEFI
TPM
UEFI
TPM
When a computer system is turned on, the first firmware instructions executed are either the Basic Input Output System (BIOS) or the newer Unified Extensible Firmware Interface (UEFI) standard that supports security features such as secure boot and larger storage devices. When secure boot is enabled, only trusted operating systems (OSs) that have not been tampered with, such as with malware infected OS boot files, are allowed to start on the computer. Trusted Platform Module (TPM) is a firmware chip within a computing device that ensures device boot integrity as well as storing cryptographic keys used to encrypt storage devices
Which configuration option enhances the user authentication process?
HSM
SSO
MFA
MFA
Multifactor authentication (MFA) uses two or more identity validation methods, each from different categories, such as a username and password (something you know) and a key fob (something you have)
Which term best embodies a centralized network database containing user account information?
OpenID
SAML
Directory service
Directory service
A directory service, such as Microsoft Active Directory, serves as a central network database containing objects such as users, groups, applications, and various network configurations. In the current era of cloud computing, directory services can be hosted in the cloud without having to configure servers manually to support the directory service, and the cloud-based directory service can be synchronized with an on-premises directory service
Which authentication example is considered multifactor authentication?
Username, password
Smartcard, key fob
Username, password, fingerprint scan
Username, password, fingerprint scan
Multifactor authentication uses two or more identity validation methods, each from different categories, such as a username and password (something you know) and a fingerprint scan (something you are). “Something you are” refers to biometric authentication, which can also include authentication through other unique personal characteristics related to face geometry, voice pattern, retinal and iris scans, as well as unique palm or finger vein patterns
When authenticating to your cloud account, you must supply a username, password, and a unique numeric code supplied from a smartphone app that changes every 30 seconds. Which term is used to describe the changing numeric code?
SMS
TOTP
Virtual smartcard
TOTP
A time-based one-time password (TOTP) derives randomness from the current time in which it is generated and normally expires within a short period of time such as 30 seconds, as opposed to a static, unchanging code that does not expire. The closely related HMAC-based one-time password (HTOP) is technique whereby a client device is synchronized with a server and uses this to generate a unique code instead of the current time. TOTPs are normally transmitted out-of-band on a different device such as through a smartphone app (something you have) when a user attempts to authenticate with a username and password (something you know) using a different device such as a laptop thus constituting multifactor authentication
Which authentication protocol transmits user sign-in credentials in plain text over the network?
CHAP
TACACS+
PAP
PAP
The Password Authentication Protocol (PAP) is an older authentication standard that passes credentials over the network in clear text format, meaning that capturing those network transmissions reveals user credentials. PAP was often used for remote authentication such as for Point-to-Point Protocol (PPP) and virtual private network (VPN) connections
Your organization is creating a web application that generates animated video from story text. Instead of requiring users to create an account with your organization before using the app, you want to enable users to sign in using their existing Google or Facebook accounts. What type of authentication is this?
Attested
Token key
Federated
Federated
Identity federation solutions use a centralized user identity store, eliminating the need for users to create and maintain user accounts for multiple web sites
Which security hardware can be used for multifactor authentication?
Token key
TPM
HSM
Token key
A token key refers to a hardware device used for IT system authentication (something you have) that generates a unique value used in addition to other authentication factors such as a username and password (something you know)
Which term best describes a user authenticating to a service and receiving a unique authentication code via a phone call?
Token key
Out-of-band authentication
Federation
Out-of-band authentication
Out-of-band authentication is used with multifactor authentication. An example is a user initiating logging in to a web site using a laptop computer where an authentication code is sent to the user’s smartphone and is required to complete authentication
Which type of authentication method measures the motion patterns of a person’s body movement?
SAML
Biometric
Gait analysis
Gait analysis
Gait analysis measures the way a person moves and can be used as an authentication measure
A user complains that her new laptop occasionally does not allow fingerprint authentication. Which term best describes this situation?
Crossover error rate
False acceptance
False rejection
False rejection
An authentication system’s rejection of legitimate authentications is referred to as a false rejection rate (FRR). An example would be a 5 percent rejection rate, based on facial recognition authentication that does not correctly identify a user’s face
A travelling employee is unable to authenticate to a corporate custom web application that is normally accessible when he’s at home. What type of authentication is in place or the custom web application?
Biometric
Federated
Geolocation
Geolocation
Geolocation is a form of authentication (where you are) that checks where a connection is originating from. Some web sites will not allow access to users who travel to foreign countries and attempt to log in to a web site
Which of the following represents the correct sequence in which AAA occurs?
Authorization, authentication, accounting
Authentication, authorization, accounting
Accounting, authentication, authorization
Authentication, authorization, accounting
AAA refers to authentication (proving of one’s identity) which occurs first, followed by authorization (being granted resource access), and finally accounting (logging and auditing resource access). Centralized authentication systems such as RADIUS are AAA systems
You have configured your smartphone authentication such that, using your finger, you connect points on a picture. Which type of authentication category does this apply to?
Something you are
Something you know
Something you do
Something you do
“Something you do” is an authentication category that includes actions such as drawing points on a picture using your finger