Chapter 4 - Access Control, Authentication & Authorization Flashcards

1
Q

What’s the concept behind “access control”?

4-131

A

Let the right ones in, keep the wrong ones out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tell me the difference between identification and authentication.

4-131

A

identification - finding out who someone is

authentication - verifying the identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have two or more parties authenticating each other. What is this called?

4-132

A

mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have an authentication process, and in that process, two or more access methods are included. What kind of authentication system is this?

4-133

A

multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tell me the 5 “factors” you have to work with when building your authentication system.

4-131

A

something you know, have, are, or do

somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does NAC stand for?

4-134

A

network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True/False: Security tokens are used to identify and authenticate the user, and because of this, they are similar to certificates.

4-135

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have a group of computer networks that all agree on standards of operation. What do you call this?

hint: Star Wars

4-135

A

a federation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your identity, linked with your priveleges, allows you to cross business units and business boundaries. What kind of identity is this?

4-135

A

a federated identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are a user on a client PC communicating with an authentication server. Tell me the steps involved in the security token authentication.

4-136

A
server presents a challenge to the pc
pc provides a response
server sends a token device challenge
pc sends back a valid certificate
server grants authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have an Active Directory and the domains of your forest trust each other. By default, these trusts are _______ and _______.

4-136

A

two-way, transitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tell me the difference between PAP and SPAP.

4-139

A

PAP sent stuff in plain text. SPAP encrypts stuff, THEN sends it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A protocol was designed to stop man-in-the-middle attacks. What is that protocol?

There is another protocol that uses the aforementioned protocol to provide authentication. which protocol is that?

4-139

A

CHAP

PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol uses a time based factor for the creation of new passwords?

4-139

A

TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which protocol is based on a hash message algorithm?

4-139

A

HOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tell me the lockout policies at the local level. There are three of them

4-141

A

account lockout duration
account lockout threshold
reset account lockout counter after

17
Q

Explain to me what SLIP is.

4-143

A

Serial Line Internet Protocol. It’s an older protocol, was used in early remote access situations, was not secure, and could only be used to pass TCP/IP traffic.

18
Q

Tell me 4 options that are common for remote authentication.

hint: tacks in a circle

4-143

A

TACACS, TACACS+, XTACACS, RADIUS

19
Q

We’ve talked about tunneling protocols like PPTP, L2TP and SSH. How is IPSec different from these?

4-145

A

It isn’t a tunneling protocol, but is used alongside a tunneling protocol. It is primarily used in LAN to LAN connections, but can also be used with some remote connections.

20
Q

Tell me the major difficulty with a single-server RADIUS environment.

4-145

A

If the server malfunctions, the entire network may refuse connections.

21
Q

What is SAML for?

4-147

A

authentication and authorization, based on XML

22
Q

You are using a KDC to get authentication to receive services from a server. What’s the problem with this?

4-148

A

the KDC is a single point of failure

23
Q

Tell me the 4 primary methods of access control.

4-150

A

mandatory access control - predefined
discretionary access control - some flexibility
role-based access control - user’s role dictates access capabilities
rule-based access control - limits the user to settings in preconfigured policies

24
Q

What is the SA account?

4-153

A

the system administrator

25
Why would you perform an access review? 4-154
To determine if someone's access level is still appropriate.
26
There is a smart card used by the Department of Defense. What type of card is this? 4-155
Common Access Card
27
You are tweaking the tolerance for unanswered login attacks on your firewall. Which feature are you adjusting? 4-158
the flood guard
28
You want to prevent broadcast loops. Which feature will you use? 4-158
Loop protection
29
You have a trusted operating system that meets a set of requirements for security. Whose requirements are those? 4-159
the government's
30
You have Evaluation Assurance Levels 1-7. Tell me very briefly about each one of them. 4-159
1-threats to security aren't viewed as serious 2-good design practices for products 3-moderate levels of security 4-common benchmark for commercial security 5-high level security, security engineering has been implemented 6-specialized security engineering 7-extremely high level security
31
You have a router that you need to configure securely. What three steps are you going to perform? 4-160
Change the default password walk through the advanced settings keep the firmware updated
32
Tell me about LDAP and secure LDAP. 4 - 147
Lightweight Directory Access Protocol. standardized directory access protocol that allows queries to be made of directories and is the main protocol used by Active Directory, port 389 secure LDAP - encrypted with SSL/TLS and port 636
33
In Kerberos, there are TGT and service ticket. tell me the difference. 4 - 148
ticket granting ticket, encrypted, time limit of 10 hours service ticket - granted by the TGT, good for 5 minutes
34
Lattice Based Control. tell me about it. 4 - 150
variation of MAC, involves a lattice composed of users, systems, and so forth
35
what is DAC? 4 - 151
discretionary access control - allows users to share information dynamically with other users
36
You are going to implement the best access controlling practices. what are they? 4 - 152 thru 160
``` least privelages separation of duties time of day restrictions user access review smart cards access control lists (implicit deny, block the connection, allow the connection, allow the connection only if it is secured) port security ```
37
Port Security has three areas. what are they? 4 - 157
MAC Limiting and Filtering 802.1X Unused Ports
38
what is the most basic form of authentication? 4 - 161
single factor authentication