Chapter 4 - Access Control, Authentication & Authorization Flashcards

1
Q

What’s the concept behind “access control”?

4-131

A

Let the right ones in, keep the wrong ones out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tell me the difference between identification and authentication.

4-131

A

identification - finding out who someone is

authentication - verifying the identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have two or more parties authenticating each other. What is this called?

4-132

A

mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have an authentication process, and in that process, two or more access methods are included. What kind of authentication system is this?

4-133

A

multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tell me the 5 “factors” you have to work with when building your authentication system.

4-131

A

something you know, have, are, or do

somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does NAC stand for?

4-134

A

network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True/False: Security tokens are used to identify and authenticate the user, and because of this, they are similar to certificates.

4-135

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have a group of computer networks that all agree on standards of operation. What do you call this?

hint: Star Wars

4-135

A

a federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your identity, linked with your priveleges, allows you to cross business units and business boundaries. What kind of identity is this?

4-135

A

a federated identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are a user on a client PC communicating with an authentication server. Tell me the steps involved in the security token authentication.

4-136

A
server presents a challenge to the pc
pc provides a response
server sends a token device challenge
pc sends back a valid certificate
server grants authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have an Active Directory and the domains of your forest trust each other. By default, these trusts are _______ and _______.

4-136

A

two-way, transitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tell me the difference between PAP and SPAP.

4-139

A

PAP sent stuff in plain text. SPAP encrypts stuff, THEN sends it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A protocol was designed to stop man-in-the-middle attacks. What is that protocol?

There is another protocol that uses the aforementioned protocol to provide authentication. which protocol is that?

4-139

A

CHAP

PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol uses a time based factor for the creation of new passwords?

4-139

A

TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which protocol is based on a hash message algorithm?

4-139

A

HOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tell me the lockout policies at the local level. There are three of them

4-141

A

account lockout duration
account lockout threshold
reset account lockout counter after

17
Q

Explain to me what SLIP is.

4-143

A

Serial Line Internet Protocol. It’s an older protocol, was used in early remote access situations, was not secure, and could only be used to pass TCP/IP traffic.

18
Q

Tell me 4 options that are common for remote authentication.

hint: tacks in a circle

4-143

A

TACACS, TACACS+, XTACACS, RADIUS

19
Q

We’ve talked about tunneling protocols like PPTP, L2TP and SSH. How is IPSec different from these?

4-145

A

It isn’t a tunneling protocol, but is used alongside a tunneling protocol. It is primarily used in LAN to LAN connections, but can also be used with some remote connections.

20
Q

Tell me the major difficulty with a single-server RADIUS environment.

4-145

A

If the server malfunctions, the entire network may refuse connections.

21
Q

What is SAML for?

4-147

A

authentication and authorization, based on XML

22
Q

You are using a KDC to get authentication to receive services from a server. What’s the problem with this?

4-148

A

the KDC is a single point of failure

23
Q

Tell me the 4 primary methods of access control.

4-150

A

mandatory access control - predefined
discretionary access control - some flexibility
role-based access control - user’s role dictates access capabilities
rule-based access control - limits the user to settings in preconfigured policies

24
Q

What is the SA account?

4-153

A

the system administrator

25
Q

Why would you perform an access review?

4-154

A

To determine if someone’s access level is still appropriate.

26
Q

There is a smart card used by the Department of Defense. What type of card is this?

4-155

A

Common Access Card

27
Q

You are tweaking the tolerance for unanswered login attacks on your firewall. Which feature are you adjusting?

4-158

A

the flood guard

28
Q

You want to prevent broadcast loops. Which feature will you use?

4-158

A

Loop protection

29
Q

You have a trusted operating system that meets a set of requirements for security. Whose requirements are those?

4-159

A

the government’s

30
Q

You have Evaluation Assurance Levels 1-7. Tell me very briefly about each one of them.

4-159

A

1-threats to security aren’t viewed as serious
2-good design practices for products
3-moderate levels of security
4-common benchmark for commercial security
5-high level security, security engineering has been implemented
6-specialized security engineering
7-extremely high level security

31
Q

You have a router that you need to configure securely. What three steps are you going to perform?

4-160

A

Change the default password
walk through the advanced settings
keep the firmware updated

32
Q

Tell me about LDAP and secure LDAP.

4 - 147

A

Lightweight Directory Access Protocol. standardized directory access protocol that allows queries to be made of directories and is the main protocol used by Active Directory, port 389

secure LDAP - encrypted with SSL/TLS and port 636

33
Q

In Kerberos, there are TGT and service ticket. tell me the difference.

4 - 148

A

ticket granting ticket, encrypted, time limit of 10 hours

service ticket - granted by the TGT, good for 5 minutes

34
Q

Lattice Based Control. tell me about it.

4 - 150

A

variation of MAC, involves a lattice composed of users, systems, and so forth

35
Q

what is DAC?

4 - 151

A

discretionary access control - allows users to share information dynamically with other users

36
Q

You are going to implement the best access controlling practices. what are they?

4 - 152 thru 160

A
least privelages
separation of duties
time of day restrictions
user access review
smart cards
access control lists (implicit deny, block the connection, allow the connection, allow the connection only if it is secured)
port security
37
Q

Port Security has three areas. what are they?

4 - 157

A

MAC Limiting and Filtering
802.1X
Unused Ports

38
Q

what is the most basic form of authentication?

4 - 161

A

single factor authentication