Section 19 Authentication Flashcards

1
Q

Use of two or more authentication factors to prove a user’s identity.

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A password is computed from a shared secret and current time.

A

Time based one time password (TOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A password is computed from a shared secret and is synchronized between the client and server.

A

HMAC based One Time Password (HOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Process to check the user’s or system’s attributes or characteristics prior to allowing it to connect.

A

Context Aware Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A default user profile for each user is created and linked with all of the resources needed.

A

Single Sign On (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A single identity is created for a user and shared with all of the organizations in a federation.

A

Federated Identity Management (FIDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Utilizes a web trust between organizations where each one certifies others in the federation.

A

Cross Certificaiton

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Organizations are able to place their trust in a single third party. (Also called a bridge model.)

A

Trusted Third Party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attestation model built upon XML used to share federated identity management information between systems.

A

Security Assertion Markup Language (SAML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An open standard and decentralized protocol that is used to authenticate users in a federated identity management system.

A

Open ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Standardized framework used for part based authentication on wired and wireless networks.

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A framework of protocols that allows for numerous methods of authentication including passwords, digital certificates, and public key infrastructure.

A

Extensible Authentication Protocols (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provides flexible authentication via secure tunneling (FAST) by using a protected access credential instead of a certificate for mutual authentication.

A

EAP FAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Supports mutual authentication by using server certificates and Microsoft’s Active Directory to authenticate a client’s passwords.

A

Protected EAP (PEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A database used to centralize information about clients and objects on the networks.

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An authenticated protocol used by Windows to provide for two ways (mutual) authentication using a system of tickets.

A

Kerberos

17
Q

Microsoft’s proprietary protocol that allows administrators and users to remotely connect to another computer via GUI.

A

Remote Desktop Protocol (RDP)

18
Q

Cross platform version of the Remote Desktop Protocol for remote user GUI access.

A

Virtual Network Computing (VNC)

19
Q

Used to provide authentication but is not considered secure since its transmits the login credentials undecrypted (in the clear).

A

Password Authentication Protocol (PAP)

20
Q

Used to provide authentication by using the user’s password to encrypt a challenge string of random numbers.

A

Challenge Handshake Authentication Protocol (CHAP)

21
Q

Allows end users to create a tunnel over an untrusted network and connect remotely and securely back into the enterprise network.

A

Virtual Private Network (VPN)

22
Q

Specialized hardware device that allows for hundreds of simultaneous VPN connections for remote workers.

A

VPN Concentrator

23
Q

A remote workers machine diverts internal traffic over the VPN but external traffic over their own internet connection.

A

Split Tunneling

24
Q

Provides centralized administrator of dial up, VPN, and wireless authentication services for 802.1x and the Extensible.

A

Remote Authentication Dial In User Service (RADIUS)

25
Q

Brute force attack in which multiple user accounts are tested with a dictionary of common passwords.

A

Password Spraying

26
Q

Brute force attack in which stolen user account names and passwords are tested against multiple websites.

A

Credential Stuffing

27
Q

A software vulnerability where the authentication mechanism allows an attacker to gain entry.

A

Broken Authentication