Chapter 4 - Access Control, Authentication and Authorization Flashcards

1
Q

Rene

What is the mechanism of verifying that identification?

A

page 131

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rene

Authentication systems or methods are based on one or more of which 5 factors

A

page 131
Something you know, such as a password or PIN
Something you have, such as a smart card, token or ID device
Something you are, such as your fingerprints or retinal pattern (often called biometrics)
Something you do, such as an action you must take to complete authentication
Somewhere you are (this is based on geolocation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rene

Whenever two or more parties authenticate each other, it is know as _______?

A

page 132

Mutual Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rene

When two or more access methods are included as part of the authenticate process is known as _______?

A

page 133

Multi-factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rene

A system that uses smart cards and passwords is referred to as a _________________?

A

page 133

Two-Factor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rene

What are similar to certificates in that they are used to identify and authenticate the user, contain the rights and access privileges to the bearer, and at the completion of a session is destroyed?

A

page 135

Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rene

What is collection of computer networks that agree on standards of operation such as security standards?

A

page 135

Federations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rene

What the 5 Authentication Protocols?

A

page 139
PAP (Password Authentication Protocol)
SPAP (Shiva Password Authentication Protocol)
CHAP (Challenge Handshake Authentication Protocol)
TOTP (Time-Base One-Time Password)
HOTP (HMAC-Based One-Time Password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rene

What must you do to configure the router securely?

A

page 160
Change the default password
Walk through the advanced settings
Keep the firmware upgraded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rene

In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) requires product developers to use good design practices?

A

page 159

EAL 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rene

In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) requires conscientious development moderate levels of security?

A

Page 159

EAL 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rene

In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) is primarily used when the user wants assurance that the system will operate correctly but threats to security aren’t viewed as serious?

A

page 159

EAL 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rene

In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) requires positive security engineering based on good commercial development practices?

A

page 159

EAL 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rene

In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) is intended to ensure that security engineering has been implemented in a product from the early design phases.

A

page 159

EAL 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Rene

In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) provides high level of assurance of specialized security engineering?

A

page 160

EAL 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rene

In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) is intended for extreme high levels of security?

A

page 160

EAL 7

17
Q

Rene

What is Network Bridging?

A

page 158
Occurs when a device has more than one network adapter card installed and the opportunity presents itself for a user on one of the networks to which the device is attached to jump to the other.

18
Q

Rene

What are the Firewall Rules?

A

page 157
Block the connection
Allow the connection
Allow the connection only if it is secured

19
Q

Rene

Who issued the CAC?

A
page 155
The DoD (Department of Defense), issued the CAC (Common Access Card) as a general identification / authorization card for military personnel, contractors and non-DoD employee.
20
Q

Rene

What are the 4 Access Control methods?

A

page 150

  • Mandatory Access Control (MAC)
  • Discretionary Access Control (DAC)
  • Role-Based Access Control (RBAC)
  • Rule-Based Access Control (RBAC)
21
Q

Rene

What is a variation of Mandatory Access Control and it isn’t addresses separately on the Security+ exam?

A

page 150

LBAC (Lattice-Based Control)

22
Q

Rene

What is SSO?

A

page 149
Single Sign On
The purpose is to give users access to all the applications and systems they need when they logon

23
Q

Rene

What type of authentication does Kerberos use?

A

page 148
Key Distribution Center (KDC)
KDC authenticates the principle (which can be a user, program or system) and provides it with a ticket.

24
Q

Rene

What type of ticket is the user given when using Kerberos and authenticates with KDC?

A

page 148
Ticket Granting Ticket (TGT)
This ticket is encrypted and has a time limit of up to 10 hours. The ticket lists the privileges of that user (much like a token)

25
Q

Rene

What is a standardized directory access protocol that allows queries to be made of directories (specifically, pared-down X.500-based directories)?

A

page 147

Lightweight Directory Access Protocol (LDAP)