Chapter 4 - Access Control, Authentication & Authorization Flashcards
What’s the concept behind “access control”?
4-131
Let the right ones in, keep the wrong ones out.
Tell me the difference between identification and authentication.
4-131
identification - finding out who someone is
authentication - verifying the identification
You have two or more parties authenticating each other. What is this called?
4-132
mutual authentication
You have an authentication process, and in that process, two or more access methods are included. What kind of authentication system is this?
4-133
multifactor authentication
Tell me the 5 “factors” you have to work with when building your authentication system.
4-131
something you know, have, are, or do
somewhere you are
What does NAC stand for?
4-134
network access control
True/False: Security tokens are used to identify and authenticate the user, and because of this, they are similar to certificates.
4-135
True
You have a group of computer networks that all agree on standards of operation. What do you call this?
hint: Star Wars
4-135
a federation
Your identity, linked with your priveleges, allows you to cross business units and business boundaries. What kind of identity is this?
4-135
a federated identity
You are a user on a client PC communicating with an authentication server. Tell me the steps involved in the security token authentication.
4-136
server presents a challenge to the pc pc provides a response server sends a token device challenge pc sends back a valid certificate server grants authentication
You have an Active Directory and the domains of your forest trust each other. By default, these trusts are _______ and _______.
4-136
two-way, transitive
Tell me the difference between PAP and SPAP.
4-139
PAP sent stuff in plain text. SPAP encrypts stuff, THEN sends it.
A protocol was designed to stop man-in-the-middle attacks. What is that protocol?
There is another protocol that uses the aforementioned protocol to provide authentication. which protocol is that?
4-139
CHAP
PPP
Which protocol uses a time based factor for the creation of new passwords?
4-139
TOTP
Which protocol is based on a hash message algorithm?
4-139
HOTP