Chapter 4 Flashcards
Identification vs. Authentication
Identification is claiming, Authentication is proving you are someone
Mutual Authentication
A client authenticates the server and vice versa
Authentication factors
Something you are, know, have etc
a pin and a password is SFA/MFA
Single factor, only something you know
layered security is synonymous with
defense in depth
NAC
Network Access Control
NAC is part of
operational security
operational security encompasses everything not related to
design and physical security of the network
Security tokens are similar to
certificates
security tokens contain
rights and access privileges
Security tokens are created when
at login time, and destroyed when the session ends
what is a federation
a collection of networks that agree on some standard of operation, e.g. security
federated identity
is a means of linking user’s identity to multiple business boundaries
transitive access
party A trusts B, B trusts C, therefore A trusts C
PAP
Authentication protocol (password authentication protocol) sends password and uid in plaintext
SPAP
Shiva PAP - replaced PAP, encrypts credentials
CHAP
Challenge Handshake AP - client generates random number and is asked for it periodically
TOTP
time-based one-time password
HOTP
HMAC based one time password
Account lockout threshold
how many attempts before lockout happens
Reset account lockout counter after
counter reset to 0 after a certain amount of time has passed
PPP stands for
Point to Point protocol
Does PPP provide data security?
no
PPP encapsulates in
NCP - Network Control Protocol
Authentication in PPP is handled in
LCP - link control protocol
PPP is unsuitable for
Wan connections
PPTP
Point to point tunneling protocol
PPTP does what?
Encapsulates and encrypts PPP packets
PPTP downside
it negotiates connection in the clear
what method was created by Cisco for dial up
Layer 2 Forwarding
Layer 2 forwarding is encrypted
false
Layer 2 forwarding works well over LANS
false
What method is a joint venture between Cisco and Microsoft
Layer 2 tunneling protocol
Layer 2 Tunneling is a hybrid of
PPTP and L2f
Layer 2 tunneling protocol is encrypted
false
Layer 2 tunneling protocol can provide data security
only through protocols like ipsec
Secure Shell uses encryption
true
IPsec is built in to
IPv6
RADIUS stands for
Remote Authentication Dial-in User Service
Radius protocol is a _______ standard
IETF
Radius allows a single server to perform authentications
true
TACACS stands for
Terminal Access Controller Access-Control System
Latest flavor of TACACS is
TACACS+
TACACS+ is widely implemented by
Cisco
TACACS+ allows for authentication from multiple methods T/F
True
SAML stands for
Security Assertion Markup Language
SAML is based on
XML
SAML is mainly used by
service providers
LDAP stands for
Lightweight Directory Access Protocol
Secure LDAP is called
LDAPS
LDAPS is encypted with
SSL/TLS
Kerberos uses a ______ to manage authentication
Key distribution center
KDC authenticates a _______
principal
A Kerberos principal is
a user, program or system
Kerberos issue what kinds of tickets
Ticket granting ticket and service ticket
Downside to kerberos
if kerberos server goes down
SSO stands for
Single Sign On
MAC
Mandatory Access Control
MAC access is defined how
all access is predefined
DAC
Discretionary Access Control
DAC handles access with more/less flexibility than MAC
more
RBAC
Role based Access Control or Rule based Access and Control
Rule Based Access Control
limits the user to setting in preconfigured policies (allow list or deny list)
Access control list can reject packets based on their types T/F
True
Firewall rules consist of
Block the connection
Allow the connection
Allow the connection only if it is secured
Switch ports (noun)
ports that only allow certain MAC address
802.1X is a _________ standard
IEEE
802.1X is a standard for what
port-based security for wireless network access control
Network Bridging
A device on the network has another NAC (wireless, 4G) that allows an attacker to jump networks
Trusted Operating System (TOS)
Meets the government’s criteria
Common Criteria
most common standard for becoming a TOS
Common Criteria distinguishes OSs by
EAL, Evaluation Assurance Level (higher the better)