Donain 5 Flashcards
What acts a DB that contains Precomputed hashes output for most possible passwords
Rainbow table
What are three common password cracking methods
Dictionary, hybrid and brute
What primary feature does a cryptographic salt provide
Makes pre computation attacks such as rainbow tables infeasible
What kind of smart care is based on time
Synchronous dynamic password tokens
What restricts access to functions based on roles and privileges
A constrained user interface
In the access control model what term is used to refer to files, directories and ports
Objects
What is a passive entity that contains or receives information
Object
They can be files, directories, pipes, devices, sockets, ports and etc
When the users biometric information is recorded so it can be used for comparison for the user to gain access
Enrollment
A password cracking program that takes dictionary words and then alters the number of characters before hashing. What type of attack is this
Hybrid
An application is interfacing with an OAuth API, Poseidon of what type of token means that delegated access has been approved and additional authorization is not necessary
Bearer token
What is the most common type of access token
Bearer token
Kerberosis does not address availability
True
Type one error
False rejection rate
Type two error
False acceptance rate
What is considered a consumer oriented federated identity management framework
Kerberosis
In OAuth I hat role is responsible for determining what data may be accessed and actions be permitted
Resource owner
What authentication method negotiated the validity of the user through tickets
Kerberosis
What JSON based technology can be used with SAML to provide authorization
OAuth
What is the primary emphasis of SAML
Authentication, but can be used to communicate authorization details
Who you declare to be on a system
Identity
Proving who you really are
Authentication
What is a random number that is hashed along the password
Salt
What a tribute of the Kerberos authentication process makes it so strong
Mutual authentication
Symmetric key authentication system that allows clients to securely access network services
Kerberos