Lesson 9 - Chapter 1: Authentication Flashcards

1
Q

What is logical security? What does it apply?

A

applying software and technology-based measures to create a protected and secured environment for users, computers, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the AAA model represent?

A

Represents the various facets of network and data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 A’s of the AAA model?

A
  1. Authentication
  2. Authorization
  3. Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is authentication?

A

Verifying the identity of a user/system attempting to connect to (computing) resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authorization?

A

Granting the appropriate permissions to the user or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Accounting?

A

Keeping records of all activities that can affect security (like authentication and authorization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is it called when only one authentication factor is used? What does it contain?

A

Single-factor authentication (SFA)

typically only a user name and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 key factors that can be used in a multifactor authentication scheme?

A
  1. Something you have (physical)
  2. Something you know (code, PIN)
  3. Something you are (Biometrics, voice)
  4. Somewhere you are (GPS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multi-Factor Authentications are usually just how many factor authentications schemes?

A

MFAs are usually just 2FAs such as a bank card (something you have) and a PIN (something you know)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is CompTIA’s take on best password practices (Lesson 8 Password Management)? [3]

A
  1. Always change default user names and passwords
  2. Require your users to use strong passwords that expire
  3. Password protect the BIOS/UEFI and screensaver
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a smart card? What does it look like?

A

it’s the size of a credit card that contains circuitry to identify the card’s bearer/identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security tokens are commonly in what form?

A

key fob

(same function as a smart card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a key fob used for? What does it store?

A

a security token that stores digital certificates, passwords, biometric data, and more

(some generate passwords)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a hard token?

A

a small physical device that can be used to provide a second factor (in MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a hard token also called?

A

RSA token or authentication token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 basic types of hard tokens?

A
  1. Connected
  2. Disconnected
  3. Contactless
17
Q

How are Connected hard tokens used?

A

they’re inserted into a token reader that automatically transfers security/authentication information to a system

18
Q

What are Connected hard tokens commonly implemented as?

A

key fobs and USB tokens

19
Q

What are Disconnected hard tokens?

A

not physical; generates a one-time access code that is passed as a signal to a receiver

20
Q

What forms can Disconnected hard tokens take?

A

a physical device that generates the code or a smartphone app

21
Q

What is a Contactless hard token?

A

a proximity device that uses Bluetooth or a RF signal to pass authentication codes to the security system

22
Q

What is a token?

A

a device used by a user to verify their identity for the purpose of gaining access to resources

23
Q

What are soft tokens?

A

perform the same function as a token (handheld device) but through programs and apps instead

24
Q

What’s a common example of a soft token?

A

a code that is sent via SMS text message or email (OTP) that’s valid for a few minutes

25
What are Authenticator Apps?
applies 2FA to the accounts you wish to protect beyond simple login
26
How do authenticator applications work?
the user must enter a generated key value into the authenticator app to gain access to the account
27
Where are you most likely to see smart cards in public?
mass transit systems to authenticate users (uncommon in computers)
28
What are security tokens?
devices that store unique information that the user carries with them (digital certificates, passwords, biometric ata)
29
Security tokens may also store an RSA token. What are RSA tokens?
random number generators that are used with user names and passwords for extra security
30
do you have to insert key fobs/smart cards into all computers or card readers?
No, some are made to use RFID to transmit the authentication info so no insertion is necessary (Pivaris combines bio fingerprint with RFID tag, easy as opening a garage)