ch24 questions and definitions Flashcards

1
Q

The user presents credentials and requests a ticket from the key Distribution Server

A

Step 1 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The KDS verifies credentials and issues a TGT

A

Step 2 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The user presents a TGT and request for service to the KDS

A

Step 3 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The KDS verifies authorization and issues a client-to-server ticket to the desired service

A

Step 4 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The user presents a request and a client-to-server ticket to the desired service.

A

Step 5 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If the client-to-server ticket is valid, service is granted to the client.

A

Step 6 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A flexible EAP method that allows mutual authentication between a supplicant and a server.

A

EAP-FAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A open standard that provides enhanced network security by locking down the network, only allowing authenticated users to access company data, resources, and applications.

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protocol that extends TLS and provides certificate-based mutual authentication of the client and network through an encrypted channel.

A

EAP-TTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An access control approach in which access is mediated based on attributes associated with subjects and the objects to be accessed.

A

ABAC (Attribute Based Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access Control policy that is enforced over all subjects and objects in a system where the policy specifies that a subject has been granted access to information can do one or more actions.

A

DAC (Discretionary Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Control that restricts the ability of a subject or initiator to access or perform some sort of operation on an object or target.

A

MAC (Mandatory Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A strategy for managing user access on IT systems.

A

RBAC (Rule Based Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A policy-neutral access control mechanism that restricts network access based on a person’s role within an organization.

A

RBAC (Role Based Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Stores login credentials, including username, passwords, and addresses, for use on a local computer or on other computers in the same network server.

A

Credential Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password management system for macOS.

A

Keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An authentication standard that supports port-based authentication services between a user and an authorization device.

A

802.1x

18
Q

An authentication method in which users are asked to answer at least one secret question. Often used as a component for MFA and self-service password retrieval.

A

Knowledge-based authentication.

19
Q

Encrypted authentication scheme in which the unencrypted password is not transmitted over the network.

A

CHAP (Challenge-Handshake Authentication Protocol)

20
Q

Encrypted authentication scheme used in wide area network (WAN) communication.

A

MS-CHAP

21
Q

A simple user authentication protocol that does not encrypt the data and sends the password and username to the authentication server as plain text

A

PAP (Password Authentication Protocol)

22
Q

What is the purpose of a daemon?

A

Service process on a server.

23
Q

CHAP three-way handshake is.

A

Challenge sent to client. Client uses one-way hashing function to calculate response to send back. If match, communication continues.

24
Q

To describe what constituted a trusted computing system.

A

DOD’s orange book.

25
Q

An international standard for a secure crypto processor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.

A

TPM

26
Q

A physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, authentication, and other cryptographic functions.

A

HSM

27
Q

What is the difference between permissions and rights

A

Permissions are for files.
Rights are for actions.

28
Q

Software mechanism designed to manage the problem of users having multiple passwords for the myriad of different systems.

A

Password Vault

29
Q

Why does a password vault represent a single point of failure?

A

If an attacker gets the password key or master password, they have access to all the user’s passwords.

30
Q

An open protocol that allows secure, token-based authorization on the internet from the web, mobile, and desktop applications.

A

OAuth

31
Q

Is OAuth 2.0 backward-compatible with OAuth 1.0?

A

No it’s not backward-compatible.

32
Q

A simple identity layer on top of the OAuth protocol that allows clients of all types to request and received information about authenticated sessions and end users.

A

OpenID

33
Q

What role does NAS play in RADIUS and TACACS+?

A

Contacting the two servers and transmit the request for authentication to the server.

34
Q

What types of communications in RADIUS are subject to compromise?

A

Communications between a user and the client.

35
Q

What transport-layer protocol does RADIUS use?

A

UDP

36
Q

What port# does RADIUS use for accounting?

A

UDP Port 1813

37
Q

What port# does RADIUS use for authentication and authorization?

A

UDP Port 1812

38
Q

What types of communications in TACACS+ are subject to compromise?

A

NAS client and TACACS+ client.

39
Q

Is TACACS+ backward-compatible with previous TACACS versions?

A

No it’s not backward-compatible.

40
Q

What transport-layer protocol does TACACS+ use?

A

UDP and TCP

41
Q

What port# does TACACS+ use?

A

49

42
Q

Compare browser-based password storage and OS password vaults.

A

Browser-based is much less secured, OS based ones are more robust and have less overall risk.