Donain 5 Flashcards

1
Q

What acts a DB that contains Precomputed hashes output for most possible passwords

A

Rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three common password cracking methods

A

Dictionary, hybrid and brute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What primary feature does a cryptographic salt provide

A

Makes pre computation attacks such as rainbow tables infeasible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of smart care is based on time

A

Synchronous dynamic password tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What restricts access to functions based on roles and privileges

A

A constrained user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the access control model what term is used to refer to files, directories and ports

A

Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a passive entity that contains or receives information

A

Object

They can be files, directories, pipes, devices, sockets, ports and etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When the users biometric information is recorded so it can be used for comparison for the user to gain access

A

Enrollment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A password cracking program that takes dictionary words and then alters the number of characters before hashing. What type of attack is this

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An application is interfacing with an OAuth API, Poseidon of what type of token means that delegated access has been approved and additional authorization is not necessary

A

Bearer token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most common type of access token

A

Bearer token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kerberosis does not address availability

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type one error

A

False rejection rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type two error

A

False acceptance rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is considered a consumer oriented federated identity management framework

A

Kerberosis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In OAuth I hat role is responsible for determining what data may be accessed and actions be permitted

A

Resource owner

17
Q

What authentication method negotiated the validity of the user through tickets

A

Kerberosis

18
Q

What JSON based technology can be used with SAML to provide authorization

A

OAuth

19
Q

What is the primary emphasis of SAML

A

Authentication, but can be used to communicate authorization details

20
Q

Who you declare to be on a system

A

Identity

21
Q

Proving who you really are

A

Authentication

22
Q

What is a random number that is hashed along the password

A

Salt

23
Q

What a tribute of the Kerberos authentication process makes it so strong

A

Mutual authentication

24
Q

Symmetric key authentication system that allows clients to securely access network services

A

Kerberos

25
Q

Symmetric key encryption algorithms include

A

DES for V4
TDES
RC4 for V5

26
Q

Single sigh in for cloud

A

IDaaS

27
Q

Primary design types for access control systems

A

Mandatory
Discretionary
Non discretionary

28
Q

A subject having the authority to assign the accessible objects and what priv are allowed concerning those objects

A

Discretionary access control

29
Q

What term describes SSO amongst multiple orgs

A

Federated identity management

30
Q

What is associated with authentication credentials for an org

A

SSO

31
Q

Example of a non discretionary access

A

Role based