Section 3: Investigating Identity and Access Management Flashcards
What is the most common form of authentication that is most likely to be entered incorrectly?
A password; the user may forget the password or may have Caps Lock on by accident.
When you purchase a new wireless access point, what should you do first?
Change the default username and password; many default credentials are available on the internet.
What is password history?
Determines the number of passwords you can use before you can reuse your current password. Some third-party applications or systems may call this a “password reuse” list.
How can you prevent someone from reusing the same password?
Set up password history and combine with a minimum password age to prevent reuse.
Explain what a complex password requires.
Uses three of the following:
- Uppercase and lowercase letters
- Numbers
- Special characters not used in programming
How can you prevent a hacker from inserting a different password many times?
Set up an account lockout with a low value like 3. The hacker would need to guess the password within 3 attempts, otherwise the password is locked out and user account disabled.
What type of factor authentication is a smart card?
Multi-factor authentication.
- The card is something you have
- Inserting it into a card reader is something you do
- The PIN is something you know
How many factors is it if you have a password, PIN, and date of birth?
Single-factor. These are all factors that you know.
What is biometric authentication?
The use of a part of your body or voice for authentication. (iris, retina, palm, fingerprint)
What authentication method can be used by two third parties that participate in a joint venture?
Federation services. FS uses Security Assertion Mark-up Language (SAML) and extended attributes, like an employee’s ID or email address.
Name an XML-based authentication protocol.
Security Assertion Mark-up Language (SAML). Used with federation services.
What is Shibboleth?
Open-source Federation Services protocol.
What protocol is used to store and search for Active Directory objects?
Lightweight Directory Authentication Protocol (LDAP). Used to store objects in X500 format and search Active Directory objects such as users, printers, groups or computers.
What is the format of a distinguished name for a user called Fred who works in the IT department for a company with a domain called Company A that is a dotcom?
A distinguished name in the ITU X500 object format is:
“cn=Fred, ou=IT, dc=Company, dc=Com”
What authentication factor uses tickets, timestamps, and updated sequence numbers and is used to prevent replay attacks?
Kerberos authentication. Also prevents pass-the-hash attacks as it does not use NTLM but stores the account details in an encrypted database.
What is a Ticket Granting Ticket (TGT) session?
A TGT session is a process by which a user logs in to an Active Directory domain using Kerberos authentication and receives a service ticket.
What is single sign-on? Give two examples.
An authentication scheme wherein a user inserts their credentials only once and access different resources like emails and files without needing to re-enter their creds.
Examples:
- Kerberos
- Federation Services
How can you prevent a pass-the-hash attack?
Enable Kerberos or disabling NTLM. Pass-the-hash attacks exploit older systems that use NT Lan Manager (NTLM).
Give an example of when you would use Open ID Connect.
To access a device or portal using Facebook, Twitter, Google or Hotmail creds. The portal itself does not manage the account.
Name two AAA servers and the ports associated with them.
RADIUS: uses UDP port 1812 and is seen as non-proprietary.
TACACS+: uses TCP port 49
Diameter: modern secure form of RADIUS, TCP-based and uses EAP
What is used for accounting in an AAA server?
Accounting is the documentation of when someone logs in and out, typically for billing purposes. Accounting information is typically logged into a database like SQL. RADIUS uses UDP port 1813.
What is the purpose of a VPN solution?
Create a secure connection from a remote location to your corporate network or vice versa. The most secure tunneling protocol is L2TP/IPsec.
Why should you never use PAP authentication?
PAP authentication uses a password in clear test which could be captured easily by a packet sniffer.