Section 19 - Authentication Flashcards

1
Q

What is multi-factor authentication?

A

Use of two or more authentication factors to prove a user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is exponentially more secure than long passwords?

A

Multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

There are five basic factors of authentication that you can consider when determining if somebody is who they say they are. What are they?

A

Knowledge - the user provides a piece of memorized information

Ownership - the user proves that they have something in their possession that identifies them

Characteristic - something that the person is (usually accomplished with a biometic technology like fingerprint, iris or facial recognition)

Location - refers to where a person is when they’re trying to log into their account

Action - something that a user does (like signing your name)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is TOTP?

A

Time Based One Time Password

A password is computed from a shared secret and current time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is HOTP?

A

HMAC Based One Time password

A password is computer from a shared secret and is synchronized between the client and the server

*** HMAC - Hash-based Message Authentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between TOTP and HOTP?

A

Time-based One-time Password (TOTP) is a time-based OTP. The seed for TOTP is static, just like in HOTP, but the moving factor in a TOTP is time-based rather than counter-based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Aside from multi-factor authentication, there are three other options that can be utilized by an organization. What are they?

A

Context-aware authentication

Single sign-on authentication

Federated Identity Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Context-aware Authentication?

A

Process to check the user’s or system’s attributes or characteristics prior to allow it to connect?

*** The most common form of this is limiting the time or day that the user is able to log onto a particular client or server or to limit the geographic location that the user can log in from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Single Sign-On (SSO)?

A

A default user profile for each user is created and linked with all of the resources needed

*** It’s where an organization establishes a default user profile and links that profile to all of the different resources the user wants to access. Under this system, the user then creates a single long, strong password that they can memorize. This eliminates the need to remember different login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is FIDM?

A

Federal Identity Management

A single identity is created for a user and shared with all of the organization in a federation

***Each organization that joins this Federation has agreed to a common set of standards and policies for the use of identification. This allows a Federated Identity to be created for that user. This identity can then be used across all of those different businesses that are part of the Federation,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two models of FIDM?

A

Cross Certification

Trusted Third Party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Cross Certification model?

A

Utilizes a web of trust between organizations where each one certifies others in the federation

*** Each organization is going to certify every other organization inside the Federation.
This works well when there’s just a small number of organizations inside the Federation. But once that number gets large, anything above 5 or 10 organizations, it becomes pretty difficult to manage.
Thinking back to your early network studies,
you can relate the Cross Certification model to a full mesh network model. Anything higher than about five organizations and this model is going to break down really, really quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Trusted Third-Party model?

A

Organizations are able to place their trust in a single third-party

*** This third party, then, manages the verification and certification for all of the organizations within the Federation.
This is more similar to the way a traditional certificate authority on the Internet is going to work.
In this model, it’s quite efficient even with a large number
of organizations within the Federation,
because everybody goes to that one trusted person
to get their verification done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Trusted Third Party model is also referred to as?

A

The Bridge Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SAML?

A

Security Assertion Markup Language

Attestation model built upon XML used to share federated identity management information between systems

*** This supports FIDM. It is used to authenticate and authorize between different systems especially over the internet using Single Sign-On method. This is used across the web by many large organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is OpenID?

A

An open standard and decentralized protocol that is used to authenticate users in a federated identity management system

*** This allows users to log into an identity provider and they can then utilize that same account across all of the cooperating websites. These websites are known as RP’s or Relying Parties. The largest and most well known of these is Google.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is 802.1x?

A

MUST KNOW FOR TEST

Standardized framework used for port-based authentication on wired and wireless networks

This is an IEEE standard

Is a data link layer device

*** This is just the framework so it utilizes other mechanisms to do the real authentication for us. Such as, RADIUS and TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does RADIUS stand for?

A

Remote Authentication Dialing User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does TACACS+ stand for?

A

Terminal Access Controller Access Control System Plus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

There are three roles that are required for an authentication to occur under 802.1x. What are they?

A
  1. Supplicant - the device or user that’s requesting access to the network
  2. Authentication - the device through which the supplicant is attempting to access the network
  3. Authentication Server - the centralized device that performs the authentication which is usually your RADIUS or TACACS+ server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is considered to be one of the best protections that you can add to your internal network connectivity to prevent rogue devices from gaining access to your organization’s devices and connections?

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is EAP?

A

Extensible Authentication Protocol

A framework of protocols that allows for numerous methods of authentication including passwords, digital certificates, and public key infrastructure

*** 802.1x allows for us to encapsulate EAP when we’re using a wired or wireless connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is EAP-MD5?

A

A variant of EAP that utilizes simple passwords and the challenge handshake authentication process to provide remote access authentication

*** This is a one way process and does not provide mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is EAP-TLS?

A

A variant of EAP that’s going to use public key infrastructure with a digital certificate being installed on both the client and the server as a method of authentication

*** This makes it immune to password based attacks since it uses digital certificates to identify. This is considered a form of mutual authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is mutual authentication?

A

When both devices, the client and the server, are going to authenticate with one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is EAP-TTLS?

A

A variant of EAP that uses a server-side digital certificate and a client-side password for mutual authentication

*** This is more secure than EAP-MD5 which just uses password but less secure than EAP-TLS because that one removes password vulnerability entirely.

27
Q

What is EAP-FAST?

A

EAP Flexible Authentication provides flexible authentication via secure tunneling (FAST) by using a protected access credential instead of a certificate for mutual authentication

28
Q

What are the five variants of EAP?

A

EAP-TLS
EAP-TTLS
EAP-FAST
EAP-MD5
PEAP

29
Q

What is PEAP?

A

Protected EAP supports mutual authentication by using server certificate and Microsoft’s Active Directory to authenticate a client’s password

30
Q

In addition to all of the variants of EAP, there’s a proprietary protocol from Cisco called what?

A

LEAP

Lightweight EAP

31
Q

What is LDAP?

A

MUST KNOW FOR TEST

Lightweight Directory Access Protocol

A database used to centralize information about clients and objects on the network

Is an application layer protocol

** This is essentially a directory service which contains a hierarchical organization of the users, groups, servers and systems inside your network.

32
Q

LDAP communicates over which port?

A

389 - unencrypted
636 - encrypted

33
Q

Microsoft created its own implementation of LDAP known as…?

A

AD or Active Directory

34
Q

What is Active Directory?

A

In the Windows domain, this is used to organize and manage everything on the network, including those clients, servers, devices, users and groups.

** It is an example of a single sign-on system

35
Q

What is Kerberos?

A

MUST KNOW FOR TEST

An authentication protocol used by Windows to provide for two-way (mutual) authentication using a system of tickets

36
Q

Kerberos utilizes which port?

A

Port 88

37
Q

What is RDP?

A

Remote Desktop Protocol

Microsoft’s proprietary protocol that allows administrators and users to remotely connect to another computer via a GUI

38
Q

RDP doesn’t provide ___ natively.

A

authentication

*** It provides encryption but not authentication. Therefore you must enable SSL or TLS for service authentication and require digital certificates for increased security.

39
Q

What is VNC?

A

Virtual Network Computing

Cross-platform version of the Remote Desktop Protocol for remote user GUI access

*** Where RDP works on Windows machines, VNC works on Linux, OSX or Windows.

40
Q

What port does VNC work over?

A

5900

41
Q

What port does RDP work over?

A

3389

42
Q

When implementing remote access to your network, you have to carefully select the method of network authentication. What are your options?

A

PAP
CHAP
EAP

43
Q

What is PAP?

A

Password Authentication Protocol

Used to provide authentication but is not considered secure since it transmits the login credentials unencrypted (in the clear)

44
Q

What is CHAP?

A

MUST KNOW FOR TEST

Challenge Handshake Authentication Protocol is the evolution of PAP that provides authentication by using the user’s password to encrypt a challenge string of random numbers

This authentication scheme is used in dial up connections

45
Q

What is a VPN?

A

Virtual Private Network allows end users to create a tunnel over an untrusted network and connect remotely and securely back into the enterprise network

46
Q

This is commonly used by teleworkers and traveling employees so that they can remotely access the corporate resources, like intranet and file servers.

A

Remote Access VPN or Client-to-Site VPN

47
Q

VPN’s rely on two different protocols when they’re being operated. What are they?

A

Point to Point Tunneling Protocol

Layer Two Tunneling Protocol

48
Q

One area of concern that exists with VPNs is ensuring that clients aren’t using what?

A

Split Tunneling

49
Q

What is Split Tunneling?

A

A remote worker’s machine diverts internal traffic over the VPN but external traffic over their own internet connection

50
Q

What is RADIUS?

A

Provides centralized administration of dial-up, VPN, and wireless authentication services for 802.1x and the EAP

*** A client/server protocol that runs over the 7th layer of the OSI model, the application layer. IT is used to authenticate users, authorize them to services and account for their usages of those services. It is an example of an AAA.

51
Q

RADIUS uses which port?

A

Authentication - 1812 (proprietary port 1645)
Accounting - 1813
(proprietary port 1646)

UDP

52
Q

What is Cisco’s proprietary version of RADIUS?

A

TACACS+

Terminal Access Controller Access Plus

53
Q

TACACS+ uses which port?

A

49

TCP

54
Q

What is RAS?

A

MUST KNOW FOR TEST

Remote Access Services

Service that enables dial-up and VPN connections to occur from remote clients

55
Q

What is TACACS+?

A

Cisco’s proprietary version of RADIUS that provides seperate authentication and authorization functions over port 49 (TCP)

*** Because it is Cisco only, it is not considered cross platform

56
Q

What is spoofing?

A

A software-based attack where the goal is to assume the identity of a user, process, address, or other unique identifier

57
Q

What is a Man-in-the-Middle attack?

A

An attack where the attacker sits between two communicating hosts and transparently captures, monitors, and relays all communication between the hosts

58
Q

What is a Man-in-the-browser (MitB) attack?

A

An attack that intercepts API calls between the browser process and its DLLs

59
Q

What is the difference between a Man-in-the-Middle and a Man-in-the-browser attack?

A

If you’re attacking the network or between two clients, you’re a man in the middle.

If you’re using the browser to do it, you’re a man in the browser.

60
Q

What is password spraying?

A

Brute force attack in which multiple user accounts are tested with a dictionary of common passwords

61
Q

What is credential stuffing?

A

Brute force attack in which stolen user account names and passwords are tested against multiple branches

62
Q

What is Broken Authentication?

A

A software vulnerability where the authentication mechanism allows an attacker to gain entry

*** essentially, the coders did a bad job

63
Q

What is session hijacking?

A

This is when the application is vulnerable because you’re using session keys that aren’t strong and are easy to guess