authentication Flashcards

1
Q

the initial process of confirming the identity of a users normally done at the user ID to log on

A

identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this occurs during the identification phase as the user proves that they are who they say they are in order to obtain credentials

A

identity proofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

when your identification has been verified, you will be granted ?

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this authentications method, requires that you provide a password

A

something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this authentications method, is based on something a user has in their possession

A

something they have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this authentications method, uses a biometric system

A

something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this means that all possess a particular attribute

A

universality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this means that the attribute is different for each individual

A

uniqueness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this means that the attribute always exists and will not change over time

A

permanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this ensures that the attribute can be measured easily

A

collectability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this means that the attribute can be accurately and quickly collected

A

performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this allow for acceptable substitutes for the attribute in the case the original attribute is missing or can’t be read

A

circumvention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this identifies the degree to which the technology is accepted by users and management

A

acceptability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this authentications method, is a supplementary authentication factor that uses physical location to verify a uses identity

A

somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this authentications method, is a supplementary authentication factor that requires an action to verify a users identity

A

something you do
example:
handwriting sample
type test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

this occurs when a person who should be allowed access is denied access

A

false negative.

17
Q

this occurs when a person who should be denied access is allowed access

A

false positive

18
Q

the point at which the number of false positives match the number of false negatives in a biometric system

A

crossover error rate

19
Q

the number of subjects or authentication attempts that can be validated

A

processing rate

20
Q

the original authentication protocol for Windows computers

A

LAN Manager (LANMAN)

21
Q

this authentication protocol supports Window 9 and pre NT systems

22
Q

this authentication protocol, replaced LANMAN

23
Q

this authentication protocol, is supported by all current window operation systems

24
Q

this authentication protocol, uses both authentication and authorization and is used by computers use an Active Directory domain

25
Kerberos uses _____ to authenticate users and to authorize resources
security tokens or tickets
26
Kerberos uses _____ to grant tickets for specific resources
a ticket granting server
27
what is the function of the Key distribution center (KDC)
combines the authentication server and ticket granting servers
28
it allows a use to sign on once to a network and access all authorized resource on the network
single sign on (SSO)
29
this SSO solution is used my Macintosh and Unix
Kerberos
30
this SSO uses symmetric key cryptography
Kerberos
31
this SSO solution uses asymmetric cryptography
SESAME