Chapter 13: Authentication & Access Control Flashcards
What’s added to AAAA from AAA? pg. 458
auditing is added to the AAA features
AAA and AAAA are __ , __ models for managing network security through one central location. pg. 458
systemized and conceptual models because they’re not protocols
T/F RADIUS is utilized for Dial-Up accessibility. pg. 458
False
What could you use for authentication on an RAS server as an alternative to RADIUS? pg. 458
TACACS+
What can be layered on top SSL/TLS to protect your HTTP traffic? pg. 459
HTTPS
What’s another name for network controller? pg. 460
Network Interface Card or NIC
Which authentication protocols could you add to your network to ensure the username and password never cross the wire? pg. 460
CHAP
What is Microsoft’s own variation of CHAP and how is it different? pg. 461
MS-CHAP / unlike CHAP, which requires the shared secret to be stored locally in clear text, MS-CHAP encrypts the secret locally
What uses a cryptographic process that uses an algorithm to verify that information came from where it says and that it has not changed. pg. 462
Hashes
Ron Rivest designed this algorithm that is used to ensure the integrity of transmission. pg. 462
MD5
This feature comes into play when a device attempts to access the network. pg. 462
Posture Assessment
What does the Posture Assessment check? pg. 463
Anti-malware updates, operating system updates, Windows Registry settings
What happens to a device trying to connect to your network prior to Posture Assessment taking place? pg. 463
the device is first placed in a Guest Network