Chapter 4 Flashcards

1
Q

Identification vs. Authentication

A

Identification is claiming, Authentication is proving you are someone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mutual Authentication

A

A client authenticates the server and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication factors

A

Something you are, know, have etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a pin and a password is SFA/MFA

A

Single factor, only something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

layered security is synonymous with

A

defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NAC

A

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NAC is part of

A

operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

operational security encompasses everything not related to

A

design and physical security of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security tokens are similar to

A

certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

security tokens contain

A

rights and access privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security tokens are created when

A

at login time, and destroyed when the session ends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a federation

A

a collection of networks that agree on some standard of operation, e.g. security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

federated identity

A

is a means of linking user’s identity to multiple business boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

transitive access

A

party A trusts B, B trusts C, therefore A trusts C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PAP

A

Authentication protocol (password authentication protocol) sends password and uid in plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SPAP

A

Shiva PAP - replaced PAP, encrypts credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CHAP

A

Challenge Handshake AP - client generates random number and is asked for it periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TOTP

A

time-based one-time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HOTP

A

HMAC based one time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Account lockout threshold

A

how many attempts before lockout happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Reset account lockout counter after

A

counter reset to 0 after a certain amount of time has passed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PPP stands for

A

Point to Point protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Does PPP provide data security?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PPP encapsulates in

A

NCP - Network Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Authentication in PPP is handled in

A

LCP - link control protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

PPP is unsuitable for

A

Wan connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

PPTP

A

Point to point tunneling protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

PPTP does what?

A

Encapsulates and encrypts PPP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

PPTP downside

A

it negotiates connection in the clear

30
Q

what method was created by Cisco for dial up

A

Layer 2 Forwarding

31
Q

Layer 2 forwarding is encrypted

A

false

32
Q

Layer 2 forwarding works well over LANS

A

false

33
Q

What method is a joint venture between Cisco and Microsoft

A

Layer 2 tunneling protocol

34
Q

Layer 2 Tunneling is a hybrid of

A

PPTP and L2f

35
Q

Layer 2 tunneling protocol is encrypted

A

false

36
Q

Layer 2 tunneling protocol can provide data security

A

only through protocols like ipsec

37
Q

Secure Shell uses encryption

A

true

38
Q

IPsec is built in to

A

IPv6

39
Q

RADIUS stands for

A

Remote Authentication Dial-in User Service

40
Q

Radius protocol is a _______ standard

A

IETF

41
Q

Radius allows a single server to perform authentications

A

true

42
Q

TACACS stands for

A

Terminal Access Controller Access-Control System

43
Q

Latest flavor of TACACS is

A

TACACS+

44
Q

TACACS+ is widely implemented by

A

Cisco

45
Q

TACACS+ allows for authentication from multiple methods T/F

A

True

46
Q

SAML stands for

A

Security Assertion Markup Language

47
Q

SAML is based on

A

XML

48
Q

SAML is mainly used by

A

service providers

49
Q

LDAP stands for

A

Lightweight Directory Access Protocol

50
Q

Secure LDAP is called

A

LDAPS

51
Q

LDAPS is encypted with

A

SSL/TLS

52
Q

Kerberos uses a ______ to manage authentication

A

Key distribution center

53
Q

KDC authenticates a _______

A

principal

54
Q

A Kerberos principal is

A

a user, program or system

55
Q

Kerberos issue what kinds of tickets

A

Ticket granting ticket and service ticket

56
Q

Downside to kerberos

A

if kerberos server goes down

57
Q

SSO stands for

A

Single Sign On

58
Q

MAC

A

Mandatory Access Control

59
Q

MAC access is defined how

A

all access is predefined

60
Q

DAC

A

Discretionary Access Control

61
Q

DAC handles access with more/less flexibility than MAC

A

more

62
Q

RBAC

A

Role based Access Control or Rule based Access and Control

63
Q

Rule Based Access Control

A

limits the user to setting in preconfigured policies (allow list or deny list)

64
Q

Access control list can reject packets based on their types T/F

A

True

65
Q

Firewall rules consist of

A

Block the connection
Allow the connection
Allow the connection only if it is secured

66
Q

Switch ports (noun)

A

ports that only allow certain MAC address

67
Q

802.1X is a _________ standard

A

IEEE

68
Q

802.1X is a standard for what

A

port-based security for wireless network access control

69
Q

Network Bridging

A

A device on the network has another NAC (wireless, 4G) that allows an attacker to jump networks

70
Q

Trusted Operating System (TOS)

A

Meets the government’s criteria

71
Q

Common Criteria

A

most common standard for becoming a TOS

72
Q

Common Criteria distinguishes OSs by

A

EAL, Evaluation Assurance Level (higher the better)