Chapter 4 Access Control, Authentication, and Authorization Flashcards

1
Q

What does TACACS stand for?

A

Terminal Access Controller Access-Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TACACS is ___ -oriented environment

A

Client/Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The most current version of TACACS is ___

A

TACACS +

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ____ allows you to create groups of users and systems and segment them on the network.

A

VLAN

Virtual Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPSec provides _______

A

secure authentication and encryption of data and headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PPP doesn’t provide ___

A

Data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A __ connection allows remote users to log on to the network and have access as though they were local users on the network

A

Point to point protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ works by encapsulating the network traffic in a protocol called ____. Authentication is handled by the ____

A

PPP/Network Control Protocol (NCP) / Link Control Protocol (LCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You should use ___ when you want to improve network security by implementing a single service to authenticate users who connect remotely to the network.

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The major difficulty with a single-server RADIUS environment is

A

Is that the entire network may refuse connections if the server malfunctions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ Is a standardized directory access protocol that allows queries to be made of directories.

A

Lightweight Access Directory Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LDAP operates at port ___

A

389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

With secure LDAP (LDAPS) all LDAP communications are encrypted with ___ and port ___ is used.

A

SSL/TLS Port 636 is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kerberos authentication uses a _____

A

Key distribution Center (KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ticket granted in Kerberos is valid up to __ hours

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is TGT?

A

Ticket Granting Ticket

17
Q

What is SSO

A

Single Sign On

18
Q

What are the four primary methods of access controls?

A

MAC (Mandatory Access Control)
DAC(Discretionary Access Control)
Role-based Access Control (RBAC)
Rule-Based Access Control (RBAC)

19
Q

___ Means that any given user (or system) is given the minimum privileges necc

A

Least Privileges

20
Q

___ is a process to determine whether a users access level is still appropriate.

A

Access Review

21
Q

___ implies an ongoing audit of what resources a user actually actually accesses.

A

Continuous Monitoring

22
Q

A ___ card itself usually contains a small amount of memory that can be used to store permissions and access information

A

Smart card

23
Q

_ is a protection feature built into many firewalls that allows the administrator to tweak the tolerance for unanswered attacks.

A

Flood Guard

24
Q

A ___ makes it possible to lessen the likelihood of a successful DoS attack.

A

Flood Guard

25
Q

_ is a feature that works in layer 2 switching configs and is intended to prevent broadcast loops.

A

Loop Protection

26
Q

___ occurs when a device has more than one network adapter card installed and the opportunity presents itself for a user on one of the networks to which the device is attached to jump to the other.

A

Network Bridging

27
Q

To prevent Network Bridging, you can configure workstations to do ____

A

Disable unused connections

28
Q

___ is crucial to identifying problems that occur related to security

A

Log analysis

29
Q

What is a TOS?

A

A trusted operating system is any operating system that meets the governments requirements for security.

30
Q

__ is primarily used when the user wants assurance that the system will operate correctly but threats to security aren’t viewed as serious.

A

EAL 1

31
Q

___ requires product developers to use good design practices. Security isn’t considered a high priority.

A

EAL 2

32
Q

requires conscientious development efforts to provide moderate levels of security.

A

EAL 3

33
Q

requires positive engineering based on good commercial developments practices. It is anticipated that ____ will be the common benchmark for commercial systems.

A

EAL 4