Authentication Concepts Flashcards

1
Q

What does effective access control start with? Why?

A

Strong authentication. If authentication can be bypassed then authorization has no effect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Strong password is anything from a length of what?

A

14 chars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Windows domains use what to manage multiple users and computers in a domain? What is it implemented on and what might you link to it?

A

Group Policy. It’s implemented on windows domain controllers. You link a Group Policy Object to an Organizational Unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In MS domains, how are users and computer accounts organized?

A

Into Organizational Units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Smart cards are something you have, what security elements (confidendiality etc) do they support? Why?

A

Confidentiality - embedded certificate is used for encryption
Integrity - can be used with a digital signature
Authentication and non-repudiation - when used with signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What two other things are similar to Smart Cards and who are they used by?

A

CAC and PIV:
Common Access Card, US DoD
Personal Identity Verification, FBI
Main difference is they use photo ID too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the disadvantage of using HMAC One Time Password (HOTP)? What is a more secure way and what does it use instead of HOTP?

A

The temp password is valid until the point it is used. It doesn’t expire until it is used.
TOTP (Time-based One Time Password is a more secure alternative.
It uses a timestamp instead of a counter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the next step in the file transfer process using HMAC?

1) a shared private key is exchanged between a client and server who are exchanging a file
2) the file is encrypted and a hash generated
3) …

A

3) the hash is then encrypted by the server before sending to the clienT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TOTP creates a one-time password that expires after how long?

A

30 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In Biometric Errors, what is False Acceptance?

A

when a biometric system incorrectly

identifies an unauthorized user as an authorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the CER? What does it denote? Is a lower or higher reading more accurate?

A

The CER is the Crossover Error Rate is the crossover point of the False Rejection Rate and the False Acceptance Rate in a Biometric system.
It denotes how accurate a biometric system is in correctly identifying biometric data.
A lower reading is more accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the name given to the mechanism that allows entities to prove their identity by using credentials known to another entity?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication occurs when an entity provides what?

A

proof of an identity (such as a password). A second entity is the authenticator and it verifies the authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly