Module 4 / Unit 5 / Authentication and Endpoint Security Flashcards

1
Q

What element is missing from the following list and what is its purpose: identification, authentication, accounting.

A

Authorization - assigning privileges over the network object to the subject.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do malicious insider threats often pose greater risk than malicious users generally?

A

Malicious insiders are trusted users, meaning they have existing privileges to work on the network and access resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is a logic bomb unlikely to be detected by anti-virus software?

A

Most anti-virus software depends on signatures of known malware to detect threats. A logic bomb is a specially crafted script or program that runs according to specific triggers, ususally perpetrated by an insider threat, and so unlikely to be detectable by routine scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of SSO?

A

Single Sign-on allows users to authenticate once to gain access to different resources. This reduces the number of logins a user has to remember.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do social engineering attacks succeed?

A

They generally depend on lack of security awareness in users. An attacker can either be intimidating (exploiting users’ ignorance of technical subjects or fear of authority) or persuasive (exploiting the “customer service” mindset to be helpful developed in most organizations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How might an attacker recover a password from an encrypted hash?

A

By using a password cracking tool. This may recover the password if it uses a simple dictionary word or if it is insufficiently long and complex (brute force).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the main features of a digital certificate?

A

A digital certificate contains the subject’s public key, which can be used to cryptographically authenticate the subject and encrypt messages sent to it. The certificate is signed by a Certificate Authority (CA) that has validated the subject’s identity. The certificate contains other information to identify the subject and describe its purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the main features provided by Kerberos authentication?

A

Single sign-on and support for mutual authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a RADIUS client and how should it be configured?

A

A device or server that accepts user connections. Using RADIUS architecture, the client does not need to be able to perform authentication itself; it passes the logon request to an AAA server. The client needs to be configured with the RADIUS server address and preshared key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the “ARP inspection” security feature of a switch mitigate against ARP flooding?

A

It maintains a trusted database of IP:ARP mappings and blocks any nonconforming gratuitous ARP replies from untrusted ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or false? A switch implementing 802.1X would be described as an “authenticator”.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by “remediation” in the context of NAC?

A

The options provided to a client that does not meet the health policy - for example, allowed basic internet access only, given access to required patches, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly