Authentication and Identity Management Flashcards
You must set up a secure authentication and encryption method for your remote users. Most users are remote salespeople who connect to the company’s networks from home networks or hotel Internet connections. Which of the following methods would you use?
802.1X
VPN
Kerberos
VPN
The VPN can encrypt your communications while providing authentication to an authentication server. This is especially important for users connecting remotely over the Internet from insecure locations
You are tasked with creating a high-security authentication system for physical access control to a military installation. Which of the following authentication systems would be most appropriate?
Biometric eye scan
Security badge
Smart card and PIN
Biometric eye scan
For high-security installations, biometrics is an extremely secure method to authenticate users based on unique physical characteristics
You are setting up an LDAP server that will provide secure, encrypted authentication services. Which of the following protocols and ports do you use?
LDAP on TCP port 689
LDAPS on TCP port 389
LDAPS on TCP port 689
LDAPS on TCP port 689
When you use LDAPS (which uses TCP port 689), the authentication takes place over an encrypted channel to prevent the capture of authentication credentials
You are at home and have received a call from your office that one of your mail servers is down. You have set up a secure, encrypted remote access method to an administrative computer at your office. Which of the following remote access methods do you use?
Dial-up
Telnet
VPN
VPN
The VPN method provides a secure, encrypted channel over the Internet to your organization’s private network
You have several home users with Internet access who require remote access to your organization’s network. Which of the following remote access and authentication technologies would be the most secure?
Dial-up access to a Kerberos server
A VPN authenticated to a RADIUS server
Telnet access to a local password database
A VPN authenticated to a RADIUS server
By using a VPN to a RADIUS server, you ensure that your communications are encrypted and that secure authentication takes place to the RADIUS server
A web services provider has suggested improving their security through the implementation of two-factor authentication. What would be the most likely authentication method?
TOTP
SAML
ISDN
TOTP
Time-based One-time Passwords (TOTPs) allow users to log in to a system with a username and password combination and then a one-time token, usually generated from a separate device
You are creating an authentication mechanism for physical access to a high-security government building. The high-security nature of the facility requires at least a three-factor authentication model. Which of the authentication types do you use?
Biometric eye scan
Smart card and PIN
Smart card, PIN, and fingerprint scan
Smart card, PIN, and fingerprint scan
For a three-factor authentication model, you need at least three different types of authentication. A biometric eye scan, although extremely secure, is still only a one-factor system, while the other methods (such as a smart card and a PIN) are only two-factor systems
After a user is identified and authenticated to the system, what else must be performed to enable the user to use a resource?
Authorization
Authentication by token
Encryption of network access
Authorization
Although a user has been given access to log in to the network, he still needs to be authorized to use a particular resource based on access permissions
SAML implementations have three basic roles: the identity, the identity provider, and the ___________.
Internet provider
service provider
authentication provider
service provider
The service provider takes the token passed from the identity provider and either accepts and provides services to the user or denies the request and does not provide the services
You are setting up a single sign-on authentication system for a large enterprise network of 5000 users. Which of the following authentication methods would you use?
Local login and password database
Login and password with a security token
LDAP server
LDAP server
An LDAP server provides a centralized authentication database that can be used to securely authenticate a user to multiple services on the same network. This is the most efficient and secure method for a large network of 5000 users. Other methods would require tedious configuration and management of each individual user