Chapter 4 Flashcards
What is 802.11i used for?
Wifi Security Standard, fully implemented in WPA2
What is 802.1x used for?
to authenticate devices
How do you describe CER?
The point at which false rejections and false acceptances are equal
What is type I authentication?
Something you know
What is type II authentication?
Something you have
What is type III authentication?
Something you are
What does SAML do?
XML Open standard data format for exchanging authentication and authorization data between parties
What does OAUTH do?
open standard for token based authentication and authorization on the internet and allow end users account info to be used by third party services, without exposing password
What does OpenID do?
done by third party, used to sign in to any website that accepts it
What is NTLM?
Used by Windows to authenticate server that is not part of network domain
What network protocol can uses digital certificates to authenticate with RADIUS?
802.1x
How are rainbow tables best mitigated against?
Longer Passwords
What does Kerberos use to issue tickets?
Key Distribution Center
What does TACACS+ do?
Provides authentication and authorization and accounting requests against central database
What is a weakness if SAML?
The integrity of it’s users.
What is Shibboleth?
Middleware solution for authentication and identity management that uses SAML.
What is Credentialed Management?
Allows users to avoid to remember login credentials use logins from the originating network.
What is the weakness of PAP?
Credentials sent in cleartext.
Difference between CHAP and MS-CHAPv2?
MS-CHAPv2 provides for mutual authentication and CHAP only provides authenticating client to the server.
Which access control model is based on the Trusted Computer System Evaluation Criteria (TCSEC)?
DAC
Ingrid is reviewing her company’s recertification policy. Which of the following is the best reason to recertify?
to audit permissions