Authentication Flashcards

1
Q

Use of two or more authentication factors to prove a user’s identity
* Knowledge
* Ownership
* Characteristic
* Location
* Action

A

Multi-factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • A password is computed from a shared secret and current time
A

Time based one time password (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A password is computed from a shared secret and is synchronized
between the client and the server

A

HMAC-based one Time Password (HOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Process to check the user’s or system’s attributed or characteristics prior
to allowing it to connect

A

Context aware Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A default user profile for each user is created and linked with all of the
resources needed

A

Sing sign on (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A single identity is created for a user and shared with all of the
organizations in a federation

A

Federated Identity Management (FIdM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Utilizes a web of trust between organizations where each one
certifies others in the federation

A

Cross Certificatioin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Organizations are able to place their trust in a single third-party
(also called the bridge model)

A

Trusted Third-Party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attestation model built upon XML used to share federated
identity management information between systems

A

Security Assertion Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An open standard and decentralized protocol that is used to
authenticate users in a federated identity management system

A

OpenID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Standardized framework used for port-based authentication on wired
and wireless networks

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A framework of protocols that allows for numerous methods of
authentication including passwords, digital certificates, and public key
infrastructure

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provides flexible authentication via secure tunneling (FAST) by using a
protected access credential instead of a certificate for mutual
authentication

A

EAP-FAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Supports mutual authentication by using server certificates and
Microsoft’s Active Directory to authenticate a client’s password

A

Protected EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A database used to centralize information about clients and objects on
the network

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An authentication protocol used by Windows to provide for two-way
(mutual) authentication using a system of tickets port 88

A

Kerberos

17
Q

Microsoft’s proprietary protocol that allows administrators and users to
remotely connect to another computer via a GUI

A

Remote Desktop Protocol (RDP)

18
Q

Cross-platform version of the Remote Desktop Protocol for remote user
GUI access

A

Virtual NEtwork Computing (VNC)

19
Q

Used to provide authentication but is not considered secure since it
transmits the login credentials unencrypted (in the clear)

A

Password Authentication Protocol (PAP)

20
Q

Used to provide authentication by using the user’s password to encrypt a
challenge string of random numbers

A

Challenge Handshake Authentication Protocol (CHAP)

21
Q

Allows end users to create a tunnel over an untrusted network and
connect remotely and securely back into the enterprise network

A

Virtual Private Network(VPN)

22
Q

Specialized hardware device that allows for hundreds of simultaneous
VPN connections for remote workers

A

VPN Concentrator

23
Q

A remote worker’s machine diverts internal traffic over the VPN but
external traffic over their own internet connection

A

Split Tunneling

24
Q

Provides centralized administration of dial-up, VPN, and wireless
authentication services for 802.1x and the Extensible Authentication
Protocol (EAP)

A

Remote Authentication Dial-In Service (RADIUS)