Chapter 13 Flashcards

1
Q

A ______ attempts to thwart or stop unwanted or unauthorized activity from occurring.

A

preventive control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

______ are the hardware or software mechanisms used to manage access and to provide protection for resources and systems.

A

Logical access controls (also known as technical access controls )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Controls can be implemented _______, ________ or ________.

A

administratively, logically/technically, or physically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Type __ authentication factor is something you know.

Type 1
Type 2

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Type __ authentication factor is something you have.

Type 1
Type 2

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Type __ authentication factor is something you are or something you do. It is a physical characteristic of a person identified with different types of biometrics.

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Type _ error occurs when a valid subject is not authenticated. This is
also known as a false negative authentication.

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Type __ error occurs when an invalid subject is authenticated. This is
also known as a false positive authentication.

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Devices with lower CERs are more
accurate than devices with higher CERs.
True or False ?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Kerberos uses ______symmetric encryption protocol.

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All clients and servers are registered with the_______, and it maintains the secret keys for all network members.

Ticket
Kerberos Authentication Server
Key Distribution Center
Ticket-Granting Ticket

A

Key Distribution Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The __________ verifies or rejects the authenticity and timeliness of tickets.

Ticket
Kerberos Authentication Server
Key Distribution Center
Ticket-Granting Ticket

A

Key Distribution Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the functions of the Key Distribution Center (KDC) are :

A

a ticket-granting service (TGS), and an authentication service (AS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A __________ provides proof that a subject has authenticated through a KDC and is authorized to request tickets to access other objects.

Ticket
Kerberos Authentication Server
Key Distribution Center
Ticket-Granting Ticket

A

ticket-granting ticket (TGT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ______ is an encrypted message that provides proof that a subject is authorized to access an object.

Ticket
Kerberos Authentication Server
Key Distribution Center
Ticket-Granting Ticket

A

ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_______ is an XML-based language that is commonly used to exchange authentication and authorization
(AA) information between federated organizations.

Security Assertion Markup Language (SAML)
Extensible Access Control Markup Language (XACML)
Directory Service Markup Language (DSML)
Service Provisioning Markup Language (SPML)

A

Security Assertion Markup Language (SAML)

17
Q

_____________ is a newer framework based on XML but specifically designed for exchanging user information for federated identity single sign-on purposes.

Security Assertion Markup Language (SAML)
Extensible Access Control Markup Language (XACML)
Directory Service Markup Language (DSML)
Service Provisioning Markup Language (SPML)

A

Service Provisioning Markup Language (SPML)

18
Q

_________ can display LDAP-based directory service information in an XML format.

Security Assertion Markup Language (SAML)
Extensible Access Control Markup Language (XACML)
Directory Service Markup Language (DSML)
Service Provisioning Markup Language (SPML)

A

Directory Service Markup Language (DSML)

19
Q

_______________ is used to define access control policies within an XML format, and it commonly implements role-based access controls.

Security Assertion Markup Language (SAML)
Extensible Access Control Markup Language (XACML)
Directory Service Markup Language (DSML)
Service Provisioning Markup Language (SPML)

A

Extensible Access Control Markup Language (XACML)

20
Q

_____________ is a ticket-based authentication system developed to address weaknesses in
Kerberos.

A

Secure European System for Applications in a Multivendor Environment (SESAME)

21
Q

________ effectively provides SSO for the cloud and is especially useful when internal clients access cloud-based Software as a Service (SaaS) applications.

A

Identity and Access as a Service (IDaaS)

22
Q

TACACS+ separates _____, ______ and _______ into separate processes

A

authentication, authorization, and accounting

23
Q

Diameter supports ____ & _____ for encryption.

A

Internet Protocol Security (IPsec) and Transport Layer Security (TLS)

24
Q

Name 3 AAA protocols

A

RADIUS, TACACS+, and Diameter.