Identity and Access Services Flashcards

1
Q

You are working with a development group on a new web application that will be hosted in the cloud. They need single sign-on capability to exchange authentication and authorization data between multiple security domains and they prefer working with XML. What would you suggest they use?

PAP

RADIUS

SAML

A

SAML

Security Assertion Markup Language (SAML) is a single sign-on capability used for web applications to ensure user identities can be shared and are protected. It defines standards for exchanging authentication and authorization data between security domains. It is becoming increasingly important with cloud-based solutions and with Software-as-a-Service (SaaS) applications as it ensures interoperability across identity providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A colleague has been tasked to update the authentication protocols for a very old Windows-based application running on a stand-alone system—it’s still using LANMAN and running on Windows XP. The colleague would prefer to keep using something from Microsoft, but she can’t upgrade the OS past Windows 7 during this effort. Which of the following would you suggest she use?

TACACS+

NTLM

RADIUS

A

NTLM

NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users and would be the most likely choice from the list of choices. NTLM is the successor to the authentication protocol in Microsoft LAN Manager (LANMAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following protocols uses a key distribution center and can securely pass a symmetric key over an insecure network?

PAP

LDAP

Kerberos

A

Kerberos

Kerberos securely passes a symmetric key over an insecure network using the Needham-Schroeder symmetric key protocol. Kerberos is built around the idea of a trusted third party, termed a key distribution center (KDC), which consists of two logically separate parts: an authentication server (AS) and a ticket-granting server (TGS). Kerberos communicates via “tickets” that serve to prove the identity of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your colleague is preparing a talk about TACACS+ authentication and the exchange sequence. He is having trouble remembering the three different packet types used in the authentication process. Which of the following is not one of the three packet types used in TACACS+ authentication?

START

CONTINUE

INITIATE

A

INITIATE

The TACACS+ authentication process is performed using three different packet types: START, CONTINUE, and REPLY. START and CONTINUE packets originate from the client and are directed to the TACACS+ server. The REPLY packet is used to communicate from the TACACS+ server to the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

While helping to catalog older servers in your data center, you come across a RADIUS accounting server. Your supervisor asks you what RADIUS accounting was typically used for. You tell him it was used mainly for which of the following?

Source and destination IP addresses of network traffic

Applications used by users

Time billing and security logging

A

Time billing and security logging

The primary functionality of RADIUS accounting was established to support ISPs in their user accounting, and it supports typical accounting functions for time billing and security logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your development team needs an authentication solution that supports authentication across stateless platforms. They want you to explain how other applications use Facebook or Goggle logins for authentication. In your explanation, which of the following concepts would you definitely need to mention?

Secure tokens

Secure tickets

XML requests

A

Secure tokens

Secure tokens provide for authentication across stateless platforms and can be used to identify the holder of the token to any services that adhere to the WS-Trust standard. Secure tokens are transportable, which is what allows users to log in to Twitter or other applications via Facebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are establishing a point-to-point link and need to provide authentication using PPP. Which of the following protocols would you consider?

CHAP

RADIUS

SAML

A

CHAP

Challenge Handshake Authentication Protocol (CHAP) is used to provide authentication across a point-to-point link using PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the “A” in RADIUS stand for?

Application

Authorization

Authentication

A

Authentication

The “A” stands for Authentication—Remote Authentication Dial-In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following statements regarding TACACS+ is true?

Communications between a TACACS+ client (typically a NAS) and a TACACS+ server are not secure.

Communications between a user (typically a PC) and the TACACS+ client are subject to compromise as communications are usually not encrypted.

TACACS+ is an extension of TACACS and is backward compatible.

A

Communications between a user (typically a PC) and the TACACS+ client are subject to compromise as communications are usually not encrypted.

Communications between a user (typically a PC) and the TACACS+ client are subject to compromise as they are usually not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following protocols involves a two-way handshake and sends the username and password in clear text?

SAML

LDAP

PAP

A

PAP

Password Authentication Protocol (PAP) authentication involves a two-way handshake in which the username and password are sent across the link in clear text. PAP authentication does not provide any protection against playback and line sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OpenID Connect allows for which of the following?

A third party can authenticate your users for you using accounts the users already have.

Symmetric keys can be shared across unsecured networks.

Identity can be confirmed with a single UDP packet.

A

A third party can authenticate your users for you using accounts the users already have.

OpenID was created for federated authentication that lets a third party authenticate your users for you, by using accounts the users already have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your IT group is reworking their user authentication and authorization capabilities. They need something that can be used to control access to objects as well as handle user authentication and authorization. Which of the following protocols would you suggest they use?

TACACS

PPP

LDAP

A

LDAP

LDAP is a protocol that is commonly used to handle user authentication/authorization as well as control access to Active Directory objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a service designed to enable single sign-on and federated identity-based authentication and authorization across networks?

PAP

Shibboleth

XAML

A

Shibboleth

Shibboleth is a service designed to enable single sign-on and federated identity-based authentication and authorization across networks. Shibboleth is a web-based technology that is built using SAML technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a true statement about the NTLM protocol?

It uses an encrypted challenge/response protocol to authenticate a user.

It passes user credentials in clear text only.

It is commonly used to integrate UNIX services into a network.

A

It uses an encrypted challenge/response protocol to authenticate a user.

NTLM uses an encrypted challenge/response protocol to authenticate a user without sending the user’s password over the wire, but the cryptography is considered to be weak and ineffective by today’s standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is an open protocol that allows secure, token-based authentication and authorization from web, desktop, and mobile applications and is used by companies such as Google and Microsoft to permit users to share information about their accounts with third-party applications?

TKIP

OAuth

SAML

A

OAuth

OAuth (Open Authorization) is an open protocol that allows secure, token-based authorization on the Internet from web, mobile, and desktop applications via a simple and standard method. OAuth is used by companies such as Google, Facebook, Microsoft, and Twitter to permit the users to share information about their accounts with third-party applications or websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly