Chapter 2 first half Flashcards

1
Q

Occurs when users claim (or profess) their identity with identifiers such as usernames or e-mail addresses.

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Users provide their identity with this

IE password.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA

A

Authentication, Authorizations, and Accounting

Work together with identification to provide a comprehensive access management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Grants users access to resources based on their proven identity.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tracks user activity and record it in logs.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Allows security professionals to recreate the events that preceded and security incident.

A

Audit Trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An authentication factor that typically refers to a shared secret, such as a password or PIN. This is the least secure form of Authentication.

A

Something You Know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enforce Password History

A

Remembers past passwords and prevents the user from using previously used passwords. IE if set to 24, prevents user from using previous 24 passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Maximum Password Age

A

Defines when users must change their password. IE if set to 45 days, their password will expire in 45 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Minimum Password Age

A

Defines how long users must wait before they change their password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Minimum Password LEngth

A

Enforces character length of password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Store Passwords using Reversible Encryption

A

Reversible encryption stores the password in such a way that the original password can be discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication factor that refers to something you can physically hold.

A

Something You Have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Credit-card sized cards that have an embedded microchip and a certificate.

A

Smart Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Embedded Certificate

A

Holds a users private key (only accessible by the users) and is matched with a public key (available to others).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PKI

A

Public Key Infrastructure

Supports issuing and managing certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Common Access Cards

A

Specialized type of smart card used by the DOD.

19
Q

Personal Identity Verification Card

A

PIV

Specialized type of smart card used by the US Federal Agencies.

20
Q

Token (or Key Fob)

A

An electronic device the size of a remote key for a car, including a LCD that displays a number, which changes periodically. This password is a rolling password, for one time use.

21
Q

HMAC

A

Hashing-based Message Authentication Code

Uses a hashing function and cryptographic key for many different cryptographic functions.

22
Q

HOTP

A

HMAC One-Time Password
An open standard used for creating one-time passwords, algorithm combines a secret key and an incrementing counter, and used HMAC to create a hash of the result. Then it converts the result into an HOTP value of 6-8 digits.

23
Q

TOTP

A

Time-based One-Time Password

Similar to HOTP, but uses a timestamp instead of a counter, they typically expire after 30 seconds.

24
Q

Authentication factor that uses biometrics for authentication.

A

Something You Are

25
Q

Retina Scanner

A

Scans the retina of one or both eyes and uses pattern of blood vessels at the back of the eye for recognition.

26
Q

Iris Scanner

A

Scan the retina of one or both eyes and uses pattern of blood vessels at the back of the eye for recognition.

27
Q

Voice Recognition

A

Use speech recognition methods to identify different acoustic features.

28
Q

False Acceptance

A

When a biometric system incorrectly identifies an unauthorized user as an authorized user.

29
Q

FAR

A

False Acceptance Rate

Identifies the percentage of times false acceptance occurs.

30
Q

False Rejection

A

When a biometric system incorrectly rejects an authorized user.

31
Q

FRR

A

False Rejection Rate

Identifies the amount of times false rejections occur.

32
Q

CER

A

Crossover Error Rate

The point where the FAR crosses over with the FRR.

33
Q

Authentication factor that identifies a users location.

A

Somewhere You Are

34
Q

Authentication factor that refers to actions that you can take such as gestures on a touch screen.
IE tapping a head in a picture

A

Something You Do

35
Q

Dual-Factor Authentication

A

Uses two different factors of authentication.

36
Q

Multifactor Authentication

A

Uses two or more factors of authentication, which be by two different methods.

37
Q

Kerberos

A

A network authentication mechanism used within Windows Active Directory domains and some Unix environments known as realms. It provides mutual authentication that can help prevent man-in-the-middle attacks and uses tickets to help prevent replay attacks.

38
Q

Kerberos requires several requirements for it to work:

A

A method of issuing tickets used for authentication.

Time synchronization.

A database of subjects and users.

39
Q

KDC

A

Key Distribution Center
Packages user credentials with in a ticket and uses a complex process of issuing ticket-granting tickets (TGTs) and other tickets.

40
Q

NLTM

A

New Technology LAN Manager

41
Q

NLTM is a suite of protocols that provide what three things within Windows Systems?

A

Authentication, integrity, and confidentiality.

42
Q

At their most basic, what do NLTMs use to challenge users and check their credentials?

A

A message Digest hashing algorithm.

43
Q

What are the 3 versions of NLTMs and what are they?

A

NTLM - simple MD4 hash of a users password.

NTLMv2 - a challenge -response authentication protocol.

NTLM2 - same as v2 but adds a mutual authentication.

44
Q

LDAP

A

Lightweight Directory Access Protocol
Specifies formats and methods to query directories.
It is an extension of the X.500