Ch 6,7,8 Flashcards

1
Q

What is the main weakness of a hierarchical trust model?

A

The structure depends on the integrity of the root CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a subject go about obtaining a certificate from a CA?

A

In most cases, the subject generates a key pair then adds the public key along with subject information and
certificate type in a certificate signing request (CSR) and submits it to the CA. If the CA accepts the request, it generates a certificate with the appropriate key usage and validity, signs it, and transmits it to the subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What cryptographic information is stored in a digital certificate?

A

The subject’s public key and the algorithms used for encryption and hashing.
The certificate also stores a digital signature from the issuing CA, establishing the chain of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does it mean if a certificate extension attribute is marked as critical?

A

That the application processing the certificate must be able to interpret the extension correctly. Otherwise, it
should reject the certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are developing a secure web application. What sort of certificate should you request to show
that you are the publisher of a program?

A

A code signing certificate. Certificates are issued for specific purposes. A certificate issued for one purpose
should not be reused for other functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What extension field is used with a web server certificate to support the identification of the server
by multiple specific subdomain labels?

A

The subject alternative name (SAN) field. A wildcard certificate will match any subdomain label.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the potential consequences if a company loses control of a private key?

A

It puts both data confidentiality and identification and authentication systems at risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are advising a customer about encryption for data backup security and the key escrow services
that you offer. How should you explain the risks of key escrow and potential mitigations?

A

Escrow refers to archiving the key used to encrypt the customer’s backups with your company as a third party.
The risk is that an insider attack from your company may be able to decrypt the data backups. This risk can be mitigated by requiring M-of-N access to the escrow keys, reducing the risk of a rogue administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What mechanism informs clients about suspended or revoked keys?

A

Either a published Certificate Revocation List (CRL) or an Online Certificate Status Protocol (OCSP) responder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What mechanism does HPKP implement?

A

HTTP Public Key Pinning (HPKP) ensures that when a client inspects the certificate presented by a server or a code-signed application, it is inspecting the proper certificate by submitting one or more public keys to an HTTP browser via an HTTP header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of certificate format can be used if you want to transfer your private key and certificate
from one Windows host computer to another?

A

PKCS #12 / .PFX / .P12.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between authorization and authentication?

A

Authorization means granting the account that has been configured for the user on the computer system the right to make use of a resource. Authorization manages the privileges granted on the resource. Authentication protects the validity of the user account by testing that the person accessing that account is who she/he says
she/he is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What steps should be taken to enroll a new employee on a domain network?

A

Perform checks to confirm the user’s identity, issue authentication credentials securely, assign appropriate
permissions/privileges to the account, and ensure accounting mechanisms to audit the user’s activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What methods can be used to implement location-based authentication?

A

You can query the location service running on a device or geolocation by IP. You could use location with the network, based on switch port, wireless network name, virtual LAN (VLAN), or IP subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In what scenario would PAP be considered a secure authentication method?

A

PAP is a legacy protocol that cannot be considered secure because it transmits plaintext ASCII passwords and has no cryptographic protection. The only way to ensure the security of PAP is to ensure that the endpoints established a secure tunnel (using IPSec, for instance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false? In order to create a service ticket, Kerberos passes the user’s password to the target application server for authentication.

A

False—only the KDC verifies the user credential. The Ticket Granting Service (TGS) sends the user’s account details (SID) to the target application for authorization (allocation of permissions), not authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A user maintains a list of commonly used passwords in a file located deep within the computer’s directory structure. Is this secure password management?

A

No. This is security by obscurity. The file could probably be easily discovered using search tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which property of a plaintext password is most effective at defeating a brute-force attack?

A

The length of the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or false? When implementing smart card logon, the user’s private key is stored on the smart card.

A

True. The smart card implements a cryptoprocessor for secure generation and storage of key and certificate
material.

20
Q

You are providing consultancy to a firm to help them implement smart card authentication to premises networks and cloud services. What are the main advantages of using an HSM over server-based key and certificate management services?

A

A hardware security module (HSM) is optimized for this role and so present a smaller attack surface. Itis designed to be tamper-evident to mitigate against insider threat risks. It is also likely to have a betterimplementation of a random number generator, improving the security properties of key material.

21
Q

Which network access control framework supports smart cards?

A

Local logon providers, such as Kerberos, support smart cards, but this is not network access control as the
device has already been allowed on the network. The IEEE 802.1X framework means that network access servers (switches, access points, and VPN gateways) can accept Extensible Authentication Protocols (EAP) credentials, but block any other type of network access. They act as pass-thru for an authentication server, which stores and validates the credentials. Some EAP types support smart card or machine authentication.

22
Q

What is a RADIUS client?

A

A device or server that accepts user connections, often referred to as a network access server (NAS) or as the
authenticator. Using RADIUS architecture, the client does not need to be able to perform authentication itself; it performs pass-thru to an AAA server

23
Q

What is EAPoL?

A

A network access server that support 802.1X port-based access control can enable a port but allow only the transfer of Extensible Authentication Protocol over LAN (EAPoL) traffic. This allows the supplicant and authentication server to perform the authentication process, with the network access server acting as a pass-thru

24
Q

How does OTP protect against password guessing or sniffing attacks?

A

A one-time password mechanism generates a token that is valid only for a short period (usually 60 seconds),
before it changes again

25
Q

Apart from cost, what would you consider to be the major considerations for evaluating a biometric
recognition technology?

A

Error rates (false acceptance and false rejection), throughput, and whether users will accept the technology or reject it as too intrusive or threatening to privacy.

26
Q

Which type of eye recognition is easier to perform: retinal or iris scanning?

A

Iris scans

27
Q

What two ways can biometric technologies be used other than for logon authentication?

A

For identification based on biometric features and in continuous authentication mechanisms

28
Q

You are consulting with a company about a new approach to authenticating users. You suggest
there could be cost savings and better support for multifactor authentication (MFA) if your
employees create accounts with a cloud provider. That allows the company’s staff to focus on
authorizations and privilege management. What type of service is the cloud vendor performing?

A

The cloud vendor is acting as the identity provider.

29
Q

What is the process of ensuring accounts are only created for valid users, only assigned the
appropriate privileges, and that the account credentials are known only to the valid user?

A

onboarding

30
Q

What type of organizational policies ensure that at least two people have oversight of a critical
business process?

A

Shared authority, job rotation, and mandatory enforced vacation/holidays.

31
Q

Recently, attackers were able to compromise the account of a user whose employment had been
terminated a week earlier. They used this account to access a network share and delete important
files. What account vulnerability enabled this attack?

A

While it’s possible that lax password requirements and incorrect privileges may have contributed to the account compromise, the most glaring problem is that the terminated employee’s account wasn’t disabled. Since the account was no longer being used, it should not have been left active for a malicious user to exploit.

32
Q

For what type of account would interactive logon be disabled?

A

Interactive logon refers to starting a shell. Service accounts do not require this type of access. Default superuser accounts, such as Administrator and root, may also be disabled, or limited to use in system recovery or repair.

33
Q

What (type of info stored) in files most need to be audited to perform third-party credential management?

A

SSH and API keys are often insecurely embedded in computer code or uploaded mistakenly to repositories alongside code. Also, managing shared credentials can be difficult, and many sites resort to storing them in a shared spreadsheet.
these are authentication methods
keys are stored in files

34
Q

What container would you use if you want to apply a different security policy to a subset of objects within the same domain?

A

Organization Unit (OU).

35
Q

What is the name of the policy that prevents users from choosing old passwords again?

A

Password History

36
Q

In what two ways can an IP address be used for context-based authentication?

A

An IP address can represent a logical location (subnet) on a private network. Most types of public IP address can be linked to a geographical location, based on information published by the registrant that manages that block of IP address space

37
Q

How does accounting provide non-repudiation?

A

A user’s actions are logged on the system.

38
Q

Which information resource is required to complete usage auditing?

A

Usage events must be recorded in a log. Choosing which events to log will be guided by an audit policy.

39
Q

What is the difference between locked and disabled accounts?

A

An account enters a locked state because of a policy violation, such as an incorrect password being entered incorrectly. Lockout is usually applied for a limited duration. An account is usually disabled manually, using the account properties. A disabled account can only be re-enabled manually.

40
Q

What are the advantages of a decentralized, discretionary access control policy over a mandatory access control policy?

A

It is easier for users to adjust the policy to fit changing business needs. Centralized policies can easily become inflexible and bureaucratic.

41
Q

What is the difference between security group- and role-based permissions management?

A

In a role-based access control system, groups are tightly defined according to job functions. Also, a user should (logically) only possess the permissions of one role at a time.

42
Q

In a rule-based access control model, can a subject negotiate with the data owner for access privileges? Why or why not?

A

This sort of negotiation would not be permitted under rule-based access control; it is a feature of discretionary access control.

43
Q

What is the purpose of directory services?

A

To store information about network resources and users in a format that can be accessed and updated using standard queries.

44
Q

True or false? The following string is an example of a distinguished name: CN=ad, DC=classroom,
DC=com

A

True

45
Q

You are working on a cloud application that allows users to log on with social media accounts over
the web and from a mobile application. Which protocols would you consider and which would you
choose as most suitable?

A

Security Association Markup Language (SAML) and Oauth + OpenID Connect (OIDC). OAuth with OIDC as an authentication layer offers better support for native mobile apps so is probably the best choice.