Lesson 9 - Chapter 1: Authentication Flashcards

1
Q

What is logical security? What does it apply?

A

applying software and technology-based measures to create a protected and secured environment for users, computers, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the AAA model represent?

A

Represents the various facets of network and data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 A’s of the AAA model?

A
  1. Authentication
  2. Authorization
  3. Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is authentication?

A

Verifying the identity of a user/system attempting to connect to (computing) resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authorization?

A

Granting the appropriate permissions to the user or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Accounting?

A

Keeping records of all activities that can affect security (like authentication and authorization)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is it called when only one authentication factor is used? What does it contain?

A

Single-factor authentication (SFA)

typically only a user name and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 key factors that can be used in a multifactor authentication scheme?

A
  1. Something you have (physical)
  2. Something you know (code, PIN)
  3. Something you are (Biometrics, voice)
  4. Somewhere you are (GPS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multi-Factor Authentications are usually just how many factor authentications schemes?

A

MFAs are usually just 2FAs such as a bank card (something you have) and a PIN (something you know)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is CompTIA’s take on best password practices (Lesson 8 Password Management)? [3]

A
  1. Always change default user names and passwords
  2. Require your users to use strong passwords that expire
  3. Password protect the BIOS/UEFI and screensaver
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a smart card? What does it look like?

A

it’s the size of a credit card that contains circuitry to identify the card’s bearer/identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security tokens are commonly in what form?

A

key fob

(same function as a smart card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a key fob used for? What does it store?

A

a security token that stores digital certificates, passwords, biometric data, and more

(some generate passwords)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a hard token?

A

a small physical device that can be used to provide a second factor (in MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a hard token also called?

A

RSA token or authentication token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 basic types of hard tokens?

A
  1. Connected
  2. Disconnected
  3. Contactless
17
Q

How are Connected hard tokens used?

A

they’re inserted into a token reader that automatically transfers security/authentication information to a system

18
Q

What are Connected hard tokens commonly implemented as?

A

key fobs and USB tokens

19
Q

What are Disconnected hard tokens?

A

not physical; generates a one-time access code that is passed as a signal to a receiver

20
Q

What forms can Disconnected hard tokens take?

A

a physical device that generates the code or a smartphone app

21
Q

What is a Contactless hard token?

A

a proximity device that uses Bluetooth or a RF signal to pass authentication codes to the security system

22
Q

What is a token?

A

a device used by a user to verify their identity for the purpose of gaining access to resources

23
Q

What are soft tokens?

A

perform the same function as a token (handheld device) but through programs and apps instead

24
Q

What’s a common example of a soft token?

A

a code that is sent via SMS text message or email (OTP) that’s valid for a few minutes

25
Q

What are Authenticator Apps?

A

applies 2FA to the accounts you wish to protect beyond simple login

26
Q

How do authenticator applications work?

A

the user must enter a generated key value into the authenticator app to gain access to the account

27
Q

Where are you most likely to see smart cards in public?

A

mass transit systems to authenticate users

(uncommon in computers)

28
Q

What are security tokens?

A

devices that store unique information that the user carries with them (digital certificates, passwords, biometric ata)

29
Q

Security tokens may also store an RSA token. What are RSA tokens?

A

random number generators that are used with user names and passwords for extra security

30
Q

do you have to insert key fobs/smart cards into all computers or card readers?

A

No, some are made to use RFID to transmit the authentication info so no insertion is necessary

(Pivaris combines bio fingerprint with RFID tag, easy as opening a garage)