Donain 5 Flashcards

1
Q

What acts a DB that contains Precomputed hashes output for most possible passwords

A

Rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three common password cracking methods

A

Dictionary, hybrid and brute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What primary feature does a cryptographic salt provide

A

Makes pre computation attacks such as rainbow tables infeasible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of smart care is based on time

A

Synchronous dynamic password tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What restricts access to functions based on roles and privileges

A

A constrained user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the access control model what term is used to refer to files, directories and ports

A

Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a passive entity that contains or receives information

A

Object

They can be files, directories, pipes, devices, sockets, ports and etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When the users biometric information is recorded so it can be used for comparison for the user to gain access

A

Enrollment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A password cracking program that takes dictionary words and then alters the number of characters before hashing. What type of attack is this

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An application is interfacing with an OAuth API, Poseidon of what type of token means that delegated access has been approved and additional authorization is not necessary

A

Bearer token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most common type of access token

A

Bearer token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kerberosis does not address availability

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type one error

A

False rejection rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type two error

A

False acceptance rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is considered a consumer oriented federated identity management framework

A

Kerberosis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In OAuth I hat role is responsible for determining what data may be accessed and actions be permitted

A

Resource owner

17
Q

What authentication method negotiated the validity of the user through tickets

A

Kerberosis

18
Q

What JSON based technology can be used with SAML to provide authorization

19
Q

What is the primary emphasis of SAML

A

Authentication, but can be used to communicate authorization details

20
Q

Who you declare to be on a system

21
Q

Proving who you really are

A

Authentication

22
Q

What is a random number that is hashed along the password

23
Q

What a tribute of the Kerberos authentication process makes it so strong

A

Mutual authentication

24
Q

Symmetric key authentication system that allows clients to securely access network services

25
Symmetric key encryption algorithms include
DES for V4 TDES RC4 for V5
26
Single sigh in for cloud
IDaaS
27
Primary design types for access control systems
Mandatory Discretionary Non discretionary
28
A subject having the authority to assign the accessible objects and what priv are allowed concerning those objects
Discretionary access control
29
What term describes SSO amongst multiple orgs
Federated identity management
30
What is associated with authentication credentials for an org
SSO
31
Example of a non discretionary access
Role based