Chapter 08: Identity and Access Management Flashcards
Name of an authentication framework that is commonly used for wireless networks.
EAP (Extensible Authentication Protocol)
______ is an authentication protocol designed to provide more security than protocols like PAP.
CHAP
Name microsoft’s version of CHAP.
MS-CHAP
_______ is a password-centric authentication protocol that was commonly used with the Point-to-Point protocol to authenticate users.
Password Authentication Protocol (PAP)
RADIUS servers often rely upon backend directory using ________ or _______ as a source of identity information.
LDAP or Active Directory
Name the four pieces of equipment in an authentication architecture with EAP, RADIUS, and LDAP.
Supplicant -> Authenticator -> Authentication Server -> Directory Services
Under an authentication architecture with EAP, RADIUS, and LDAP, what protocol goes from Supplicant to Authenticator?
EAP
Under an authentication architecture with EAP, RADIUS, and LDAP, what protocol goes from Authenticator to Authentication Server?
RADIUS
AAA
Authentication, Authorization, and Accounting
Which authentication extension is cisco designed?
a. Kerberos
b. RADIUS
c. TACACS+
d. LEAP
c. TACACS+
Which protocol is designed to operate on untrusted networks and uses authentication to shield its authentication traffic?
Kerberos
in kerberos, the client’s first request for a _______.
Ticket-Granting Ticket (TGT)
______ is an xml based open standard for exchanging authentication and authorization information. It is often used between identity providers and service providers for web-based applications.
SAML (Security Assertion Markup Language)
_____ is an open standard for decentralized authentication. Its identity providers can be leveraged for third-party sites using established identities.
OpenID.
“Log in with Google” functionality is an example of _________.
OpenID