Authentication Authorization and Accounting Flashcards

Security+

1
Q

What does the AAA framework stand for?

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is identification in the context of the AAA framework?

A

It’s who you claim to be, often represented by a username, especially for devices you may not physically see.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why can’t a system type a password?

A

Because systems are not human and require other forms of authentication to prove identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is authentication?

A

The process of proving you are who you say you are, often through passwords and other authentication factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you authenticate a device?

A

By using passwords, multi-factor authentication, or by placing a digitally signed certificate on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the role of a Certificate Authority (CA) in authentication?

A

A CA issues and digitally signs certificates that validate the identity of devices and users within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is authorization in the AAA framework?

A

It determines what access you have based on your identification and authentication, such as VPN access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does management software use certificates?

A

It validates the end device based on the certificates issued by the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does accounting refer to in the AAA framework?

A

Tracking resources used, such as login time, data sent and received, and logout time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a digitally signed certificate signify?

A

It verifies that the certificate is valid and was issued by a trusted Certificate Authority (CA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why might an organization maintain its own CA?

A

To have control over certificate issuance and ensure the trustworthiness of devices within their network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens when a device has a certificate?

A

It can use that certificate as an authentication factor to prove its identity to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is required for a certificate to be valid?

A

The CA’s digital signature must be present and recognized by the system validating the certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens after a user or device has authenticated?

A

They gain access to resources based on the applied authorization model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of an authorization model in user access?

A

It defines access rights based on roles, organizations, attributes, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why doesn’t associating individual users to access rights scale?

A

Because it becomes complex and difficult to manage as the number of users increases.

17
Q

What does adding an authorization model introduce?

A

It introduces an abstraction that reduces complexity and clarifies user-resource relationships.

18
Q

How does an authorization model simplify administration?

A

It makes it easy to understand and manage authorizations for any number of users or resources.

19
Q

What is a simple relationship in authorization without a model?

A

A direct relationship of User -> Resource.

20
Q

What are some issues with the simple User -> Resource authorization model?

A

It’s hard to understand why authorizations exist and does not scale effectively.

21
Q

How does an authorization model improve the relationship between users and resources?

A

It creates a clearer, more manageable framework for understanding access rights.

22
Q

What does reducing complexity in an authorization model help with?

A

It helps streamline administration and make authorizations easier to manage.

23
Q

In what ways can an authorization model be defined?

A

By roles, organizations, attributes, etc.