ch24 questions and definitions Flashcards

1
Q

The user presents credentials and requests a ticket from the key Distribution Server

A

Step 1 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The KDS verifies credentials and issues a TGT

A

Step 2 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The user presents a TGT and request for service to the KDS

A

Step 3 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The KDS verifies authorization and issues a client-to-server ticket to the desired service

A

Step 4 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The user presents a request and a client-to-server ticket to the desired service.

A

Step 5 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If the client-to-server ticket is valid, service is granted to the client.

A

Step 6 of Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A flexible EAP method that allows mutual authentication between a supplicant and a server.

A

EAP-FAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A open standard that provides enhanced network security by locking down the network, only allowing authenticated users to access company data, resources, and applications.

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protocol that extends TLS and provides certificate-based mutual authentication of the client and network through an encrypted channel.

A

EAP-TTLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An access control approach in which access is mediated based on attributes associated with subjects and the objects to be accessed.

A

ABAC (Attribute Based Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access Control policy that is enforced over all subjects and objects in a system where the policy specifies that a subject has been granted access to information can do one or more actions.

A

DAC (Discretionary Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Control that restricts the ability of a subject or initiator to access or perform some sort of operation on an object or target.

A

MAC (Mandatory Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A strategy for managing user access on IT systems.

A

RBAC (Rule Based Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A policy-neutral access control mechanism that restricts network access based on a person’s role within an organization.

A

RBAC (Role Based Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Stores login credentials, including username, passwords, and addresses, for use on a local computer or on other computers in the same network server.

A

Credential Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password management system for macOS.

A

Keychain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An authentication standard that supports port-based authentication services between a user and an authorization device.

18
Q

An authentication method in which users are asked to answer at least one secret question. Often used as a component for MFA and self-service password retrieval.

A

Knowledge-based authentication.

19
Q

Encrypted authentication scheme in which the unencrypted password is not transmitted over the network.

A

CHAP (Challenge-Handshake Authentication Protocol)

20
Q

Encrypted authentication scheme used in wide area network (WAN) communication.

21
Q

A simple user authentication protocol that does not encrypt the data and sends the password and username to the authentication server as plain text

A

PAP (Password Authentication Protocol)

22
Q

What is the purpose of a daemon?

A

Service process on a server.

23
Q

CHAP three-way handshake is.

A

Challenge sent to client. Client uses one-way hashing function to calculate response to send back. If match, communication continues.

24
Q

To describe what constituted a trusted computing system.

A

DOD’s orange book.

25
An international standard for a secure crypto processor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.
TPM
26
A physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, authentication, and other cryptographic functions.
HSM
27
What is the difference between permissions and rights
Permissions are for files. Rights are for actions.
28
Software mechanism designed to manage the problem of users having multiple passwords for the myriad of different systems.
Password Vault
29
Why does a password vault represent a single point of failure?
If an attacker gets the password key or master password, they have access to all the user's passwords.
30
An open protocol that allows secure, token-based authorization on the internet from the web, mobile, and desktop applications.
OAuth
31
Is OAuth 2.0 backward-compatible with OAuth 1.0?
No it’s not backward-compatible.
32
A simple identity layer on top of the OAuth protocol that allows clients of all types to request and received information about authenticated sessions and end users.
OpenID
33
What role does NAS play in RADIUS and TACACS+?
Contacting the two servers and transmit the request for authentication to the server.
34
What types of communications in RADIUS are subject to compromise?
Communications between a user and the client.
35
What transport-layer protocol does RADIUS use?
UDP
36
What port# does RADIUS use for accounting?
UDP Port 1813
37
What port# does RADIUS use for authentication and authorization?
UDP Port 1812
38
What types of communications in TACACS+ are subject to compromise?
NAS client and TACACS+ client.
39
Is TACACS+ backward-compatible with previous TACACS versions?
No it’s not backward-compatible.
40
What transport-layer protocol does TACACS+ use?
UDP and TCP
41
What port# does TACACS+ use?
49
42
Compare browser-based password storage and OS password vaults.
Browser-based is much less secured, OS based ones are more robust and have less overall risk.