Chapter 11 - Authentication And Account Management Flashcards

1
Q

Authentication

A

Proving that a user is genuine, and not an imposter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication credentials

A

1) what he has
2) what he is
3) what he knows
4) where he is
5) what he does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Online attack

A

An attempt to enter different passwords at the login prompt until the right password is guessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Offline attack

A

Stealing a message digest database and cracking it offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NTLM (New Technology LAN Manager) hash

A

A hash used by modern Microsoft Windows operating systems for creating password digests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pass the hash attack

A

An attack in which the user sends the hash to the remote system to then be authenticated on an NTLM system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mask attack

A

A more targeted brute force attack that uses placeholders for characters in certain positions of the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rule attack

A

Conducts a statistical analysis on the stolen passwords that is then used to create a mask to break the largest number of passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dictionary attack

A

A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rainbow tables

A

Large pre-generated data sets of encrypted passwords used in password attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key stretching

A

A password hashing algorithm that requires significantly more time than standard hashing algorithms to create the digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 popular key stretching password hash algorithms

A

1) bcrypt

2) PBKDF2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multifactor authentication

A

Using more than one type of authentication credential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security token

A

A means of authentication based on a token that the user has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware security token

A

A small device (usually one that can be affixed to a keychain) with a window display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software security token

A

Software stored in a general-purpose device like a laptop computer or smartphone.

17
Q

Time-based one-time password (TOTP)

A

A one-time password that changes after a set period.

18
Q

HMAC-based one-time password (HOTP)

A

A one-time password that changes when a specific event occurs.

19
Q

Smart card

A

A card that contains an integrated circuit chip that can hold information used as part of the authentication process.

20
Q

Proximity card

A

A contactless card that does not require physical contact with the card itself for authentication.

21
Q

Common access card (CAC)

A

A U.S department of defense (DoD) smart card used for identification of active-duty and reserve military personnel along with civilian employees and special contractors.

22
Q

Personal Identity Verification (PIV)

A

A U.S government standard for smart cards that covers all government employees.

23
Q

Standard biometrics

A

Using fingerprints or other unique physical characteristics of a persons face, hands, or eyes for authentication.

24
Q

Retinal scanner

A

A device that uses the human retina as a biometric identifier.

25
Q

Fingerprint scanner

A

A device that uses fingerprints as a biometric identifier.

26
Q

Iris scanner

A

Using a standard computer webcam to map the unique characteristic of the iris for authentication.

27
Q

Facial recognition

A

A biometric authentication that is becoming increasingly popular in smartphones that views the users face.

28
Q

Cognitive biometrics

A

Relates to the perception, thought process, and understanding of the user.

29
Q

Behavioral biometrics

A

Authentication that is based on actions that the user is uniquely qualified to perform, or something you do.

30
Q

Keystroke dynamics

A

A type of behavioral biometrics which attempts to recognize a users unique typing rhythm.

31
Q

Geolocation

A

A type of authentication based on where the user is located, or somewhere you are. It is the identification of the location of a person or object using technology.

32
Q

Federation

A

Single sign-on for networks owned by different organizations, also called federated identity management (FIM)

33
Q

Single sign-on (SSO)

A

Using one authentication credential to access multiple accounts or applications.

34
Q

Credential management

A

Managing the login credentials such as passwords in user accounts.

35
Q

Group policy

A

A preferred approach is to assign privileges by group instead of individually.