Chapter 3: Review Questions Flashcards

1
Q

What is the most common form of authentication that is most likely to be entered incorrectly?

A

Passwords are one of the most common ways of authenticating a user and they are the most to be inserted incorrectly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When I purchase a new wireless access point, what should I do first?

A

Need an answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is password history?

A

The list of passwords that the users used for their respective account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can I prevent someone from reusing the same password?

A

You can enforce a group policy that either enforces password history or password reuse. This will force the user to use whatever number of passwords indicated by the policy before they can reuse it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain what format a complex password takes.

A

The following four formats can be used to increase the password complexity:

  • Lowercase
  • Uppercase
  • Numbers
  • Special Characters Not Used in Programming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can I prevent a hacker from inserting a password multiple times?

A

Need an Answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of factor authentication is a smart card?

A

Something You Have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many factors is it if I have a password, PIN, and date of birth?

A

Only one: Something You Know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is biometric authentication?

A

Something You Are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What authentication method can be used by two third parties that participate in a joint venture?

A

Federation Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an XML-based authentication protocol

A

When two companies need to exchange the extended attribute information, they use an XML-based authentication, which i used to pass the credentials between Company A and Company B. Security Assertion Mark-up Language (SAML).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Shibboleth?

A

This is an open source federation service product that uses SAML authentication. It is used in a small federation service environment. It can use cookies as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocol is used to store and search for Active Directory objects?

A

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the format of a distinguished name for a user called Fred who works in the IT department for a company with a domain called Company A that is a dotcom?

A

CN= Fred, OU=IT department, DC=CompanyA, DC=com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What authentication factor uses tickets, timestamps, and updated sequence numbers and is used to prevent replay attacks?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Ticket Granting Ticket (TGT) session?

A

This is where a user sends their credentials (Username and password, or it could be a smart card and PIN) to a domain controller that starts the authentication process and, when it has been confirmed, will send back a Service Ticket that has a 10-hour lifespan.

17
Q

What is single sign-on? Give two examples.

A

Need an Answer

18
Q

How can I prevent a pass-the-hash attack?

A

Kerberos prevents the pass-the-hash attacks because it uses tickets to verify authentication.

19
Q

Give an example of when you would use Open ID Connect.

A

If I am signing into my Brainscape account, it asks me if I want to sign in using my Apple Account credentials; this is an example of Open ID Connect.

20
Q

Name two AAA servers and the ports associated with them.

A

Radius and TACACS+. Radius authentication uses UDP port 1812. TACACS+ TCP port 49 for authentication.

21
Q

What is the purpose of a VPN solution?

A

A VPN allows someone to remote access a corporate network through the internet.

22
Q

Why should we never use PAP authentication?

A

It is because the passwords are transmitted in clear text.

23
Q

What type of device is an iris scanner?

A

It is a biometric device

24
Q

What could be two drawbacks of using facial recognition?

A

Lighting and the need to look straight at the camera every time you had to use facial recognition.

25
Q

What is Type II in biometric authentication and why is it a security risk?

A

Type II in biometric authentication is where unauthorized individuals are accepted by biometrics and allows them access to data. This is a security risk because people who don’t have the clearance are gaining access to resources they shouldn’t have.

26
Q

What is used for accounting in an AAA server?

A

RADIUS Clients and it uses UDP port 1813.

27
Q

What is a time-limited password?

A

Need an Answer.