Authentication Flashcards

1.2 Summarize fundamental security concepts. Confidentiality, Integrity, and Availability (CIA) Non-repudiation Authentication, Authorization, and Accounting (AAA) Authenticating people Authenticating systems Authorization models Gap analysis Zero trust Control plane Adaptive identity Threat scope reduction Policy-driven access control Policy Administrator Policy Engine Data plane Implicit trust zones Subject/System Policy enforcement point 2.5 Explain the purpose of mitigation techniques used t

1
Q

In Kerberos, a token issued to an authenticated account to allow access to authorized application servers.

A

Ticket Granting Ticket (TGT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a federated network, the service that holds the user account and performs authentication.

A

Identity provider (IdP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A framework for implementing authentication providers in Linux.

A

Pluggable authentication module (PAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication token generated by a cryptoprocessor on a dedicated hardware device. As the token is never transmitted directly, this implements an ownership factor within a multi-factor authentication scheme.

A

Hard authentication token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A process that provides a shared login capability across multiple systems and enterprises. It essentially connects the identity management services of multiple systems.

A

Federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A collection of attributes that define a unique identifier for any given resource within an X.500-like directory.

A

Distinguished name (DN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

uses a public/private key pair to register each account, avoiding the need to communicate a shared secret, a weakness of HOTP and TOTP. The private key is locked to the U2F device and signs the token; the public key is registered with the authentication server and verifies the token. As no digital certificates are involved, the solution does not rely on PKI.

A

Fast IDentity Online (FIDO) Universal 2nd Factor (U2F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A biometric assessment metric that measures the number of valid subjects who are denied access.

A

False Rejection Rate (FRR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A standardized, stateless architectural style used by web applications for communication and integration.

A

Representational State Transfer (REST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A file format that uses attribute-value pairs to define configurations in a structure that is easy for both humans and machines to read and consume.

A

JavaScript Object Notation (JSON)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

A

Single sign-on (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multi-factor authentication scheme that uses ownership and biometric factors, but not knowledge factors.

A

Passwordless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Capability of an authenticator or other cryptographic module to prove that it is a root of trust and can provide reliable reporting to prove that a device or computer is a trustworthy platform.

A

Attestation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A biometric evaluation factor expressing the point at which FAR and FRR meet, with a low value indicating better performance.

A

Crossover Error Rate (CER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An XML-based data format used to exchange authentication information between a client and a service.

A

Security Assertion Markup Language (SAML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications.

A

Public key infrastructure (PKI)

17
Q

An authentication mechanism that allows a user to perform a biometric scan to operate an entry or access system. Physical characteristics stored as a digital data template can be used to authenticate a user. Typical features used include facial pattern, iris, retina, fingerprint pattern, and signature recognition.

A

Biometric authentication

18
Q

An authentication scheme that requires the user to present at least two different factors as credentials; for example, something you know, something you have, something you are, something you do, and somewhere you are. Specifying two factors is known as 2FA.

A

Multi-factor authentication (MFA)

19
Q

A challenge-response authentication protocol created by Microsoft for use in its products.

A

NT LAN Manager (NTLM) authentication

20
Q

An XML-based web services protocol that is used to exchange messages.

A

Simple Object Access Protocol (SOAP)

21
Q

A standard for federated identity management, allowing resource servers or consumer sites to work with user accounts created and managed on a separate identity provider.

A

Open Authorization (OAuth)

22
Q

Your role, position, or current project. This information can be used to determine policy and permission.

A

Attributes

23
Q

Portable HSM with a computer interface, such as USB or NFC, used for multi-factor authentication.

A

Security key

24
Q

A biometric assessment metric that measures the number of unauthorized users who are mistakenly allowed access.

A

False Acceptance Rate (FAR)

25
When the supplicant controls a private key that can generate a unique signed token. The identity provider can verify the signature via the public key. The main drawback of this approach is the administrative burden of implementing PKI to issue digital certificates.
Certificate-based authentication
26
OTP sent to a registered number or email account or generated by an authenticator app as a means of two-step verification when authenticating account access.
Soft authentication token
27
A password that is generated for use in one specific session and becomes invalid after the session ends.
One-time password (OTP)
28
A security device similar to a credit card that can store authentication information, such as a user's private key, on an embedded cryptoprocessor.
Smart cards
29
This operates like usernames and passwords but is mainly used to implement single sign-on and other automated processes.
SSH keys
30
A component of Kerberos that authenticates users and issues tickets (tokens).
Key distribution center (KDC)
31
A single sign-on authentication and authorization service that is based on a time-sensitive, ticket-granting system.
Kerberos
32
In authentication design, different technologies for implementing authentication, such as knowledge, ownership/token, and biometric/inherence. These are characterized as something you know/have/are.
Factors
33
A network service that stores identity information about all the objects in a particular network, including users, groups, servers, client computers, and printers.
Directory service
34
JavaScript Object Notation (JSON)
A file format that uses attribute-value pairs to define configurations in a structure that is easy for both humans and machines to read and consume.
35
Protocol used to access network directory databases, which store information about authorized users and their privileges, as well as other organizational information.
Lightweight Directory Access Protocol (LDAP)