User-Authentication Methods Flashcards
What authentication method uses a certificate authority and asymmetric cryptography to establish confidentiality and integrity without knowing anything about the other party prior to the conversation?
PKI
List the 5 step Kerberos user-authentication method
1) REQUEST for TICKET granting ticket (TGT)
2) TGT RETURNED by authentication service
3) REQUEST for APPLICATION ticket (authenticated with TGT)
4) Application ticket returned
5) User then can Request for service with authenticated application ticket
What’s the name given to the conceptual model for managing network security through one central location?
AAA
what authentication server allows for domain-level authentication on both wired and wireless networks?
RADIUS
What are the two differences between RADIUS and TACACS+?
1) RADIUS combines authentication and authorization into one profile but TACACS separates the two
2) TACACS uses TCP whereas RADIUS uses UDP
Which of the following only encrypt the served page data and the submitted data like POST fields? HTTPS or S-HTTP?
S-HTTP
What are the two goals of Network Admission Control do?
1) Authenticates
2) ensures systems are safe and secure before they’re allowed to access the network (by checking for malware, os version etc)
Name a common example of Network Access Control used in wireless networks? (is also used in wired but less so)
802.1x (port-access)
Which client authentication method involves the requesting client using a nonce and an ID value and sequencing them with the shared text-phrase secret to generate a one-way hash value using the MD5 encryption algorithm?
CHAP
what framework provides a standardised way of authenticating onto a LAN?
Extensible Authentication Protocol
What cryptographic process provides data integrity and origin authentication?
Hashes
Which cryptographic algorithm is published by NIST?
SHA
Name two implementations of Network Access Control
1) Cisco’s Network Admission Control
2) Microsoft’s Network Policy and Access Services (NPAS)
In Network Access Control, Posture Assessment examines the devices when they connect to the network. What 3 items are commonly checked?
1) Anti-malware updates
2) Operating system updates
3) Windows reg settings
What is a guest network used for?
It is where a device is held during Posture Assessment during Network Access Control