authentication Flashcards

1
Q

the initial process of confirming the identity of a users normally done at the user ID to log on

A

identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this occurs during the identification phase as the user proves that they are who they say they are in order to obtain credentials

A

identity proofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

when your identification has been verified, you will be granted ?

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this authentications method, requires that you provide a password

A

something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this authentications method, is based on something a user has in their possession

A

something they have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this authentications method, uses a biometric system

A

something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this means that all possess a particular attribute

A

universality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this means that the attribute is different for each individual

A

uniqueness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this means that the attribute always exists and will not change over time

A

permanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this ensures that the attribute can be measured easily

A

collectability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this means that the attribute can be accurately and quickly collected

A

performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this allow for acceptable substitutes for the attribute in the case the original attribute is missing or can’t be read

A

circumvention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this identifies the degree to which the technology is accepted by users and management

A

acceptability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this authentications method, is a supplementary authentication factor that uses physical location to verify a uses identity

A

somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this authentications method, is a supplementary authentication factor that requires an action to verify a users identity

A

something you do
example:
handwriting sample
type test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

this occurs when a person who should be allowed access is denied access

A

false negative.

17
Q

this occurs when a person who should be denied access is allowed access

A

false positive

18
Q

the point at which the number of false positives match the number of false negatives in a biometric system

A

crossover error rate

19
Q

the number of subjects or authentication attempts that can be validated

A

processing rate

20
Q

the original authentication protocol for Windows computers

A

LAN Manager (LANMAN)

21
Q

this authentication protocol supports Window 9 and pre NT systems

A

LANMAN

22
Q

this authentication protocol, replaced LANMAN

A

NT LANMAN

23
Q

this authentication protocol, is supported by all current window operation systems

A

NT LANMAN

24
Q

this authentication protocol, uses both authentication and authorization and is used by computers use an Active Directory domain

A

Kerberos

25
Q

Kerberos uses _____ to authenticate users and to authorize resources

A

security tokens or tickets

26
Q

Kerberos uses _____ to grant tickets for specific resources

A

a ticket granting server

27
Q

what is the function of the Key distribution center (KDC)

A

combines the authentication server and ticket granting servers

28
Q

it allows a use to sign on once to a network and access all authorized resource on the network

A

single sign on (SSO)

29
Q

this SSO solution is used my Macintosh and Unix

A

Kerberos

30
Q

this SSO uses symmetric key cryptography

A

Kerberos

31
Q

this SSO solution uses asymmetric cryptography

A

SESAME