Chapter 14 Flashcards

1
Q

What are common authorization mechanisms ?

A

Implicit Deny
ACL
Access Control Matrixes
Capability Tables
Constrained Interfaces
Content Dependent Controls
Context Dependent Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What access control model is where all objects have owners that can modify permissions?

A

DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is commonly referred to as a lattice based model and supports à compartmentalized and hierarchical environment?

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an XML based standard used to exchange authentication and authorization information?

A

SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an authorization framework described in RFC 6749 and support by many online sites ?

A

OAuth 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What maintains OpenID and OpenID Connect?

A

OASIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What provides both authentication and authorization by using the OAuth framework and building on the OpenID standard?

A

OIDC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What sues symmetric cryptography and tickets to prove identification and provide authentication ?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary purpose of Kerberos ?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a common SSO method within orgs?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What AAA protocol uses UDP and encrypts the password only ?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What AAA protocol uses TCP and encrypts the entire session?

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is based on RADIUS and improves many of the weaknesses of RAIDUS ?

A

Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is not compatible with RADIUS?

A

Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What attack allows an attacker to impersonate a user with the captured hash of a user’s password ?

A

Pass-the-hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of ticket grants an attacker all the privileges granted to a service account ?

A

Silver Ticket

17
Q

What are some algorithms that add salt to passwords ?

A

Argon2
Bcrypt
PBKDF2

18
Q

What is a large constant number used to increase the security of a hashed password further and is stored outside the database holding the passwords?

A

Pepper

19
Q

What can prevent users from logging on within a Kerberos environment ?

A

NTP Synchronization

20
Q

What uses a JSON Web token to provide authentication and profile information for internet based SSO?

A

OIDC