• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
Configuring Authentication and Authorization

What is Authentication ?
Authentication is an automated process whereby a computer verifies the identity of a user, computer, or service attempting to access the system.
Authentication Forms ?
Password
Certificate
Smart card
Biometrics
Security protocol.
What is the Windows PIV standard ?
Personal Identity Verification, commonly referred to as the PIV standard, allows users to use smart cards from any vendor that has published their smart card drivers with Windows Update.
How does the PKINIT protocol help with Smart Cards ?
If you use the PKINIT protocol, Windows 7 automatically finds the driver for a smart card. So the smart card can authenticate the domain without requiring the user to add intermediary software.
Some Authentication protocol packages ?
Negotiate
TLS/SSL
Credential SSPs, and
Digest
What is the Kerberos Authentication protocol.
Windows 7 uses Kerberos Version 5.0 as an SSP accessible through an SSPI. Kerberos 5.0 authenticates between a client and a server, or between individual servers.
What is the NTLM Authentication protocol ?
NTLM is a challenge/response authentication protocol used to verify the identity of parties falling outside of a particular domain. For example, it can be used to authenticate unaffiliated work groups or servers.
What is the Credential SSP Authentication protocol.
Features single sign-on with Terminal Services. With CredSSP, users' credentials can be transferred from a client computer to the target server using client policies.
What is the Digest Authentication protocol.
Digest is a challenge/response protocol that requires authentication conducted using secret keys.
Tip: To enable or disable biometric technology , you use the appropriate Group Policy settings.
Tip: To enable or disable biometric technology , you use the appropriate Group Policy settings.
Abbrev : UAC - User Account Control
Abbrev : UAC - User Account Control
Tip : To Launch Local Security Policy please " RUN secpol.msc"
Tip : To Launch Local Security Policy please " RUN secpol.msc"
Tip : Credential Manager manages user names, passwords, and proof of identification.
Tip : Credential Manager manages user names, passwords, and proof of identification.
Location of "User Rights Assignment" in Local Security Policy ?
Computer Configuration >> Windows Settings >> Security Settings >> Local Policies >> User Rights Assignment
Tip: The netsh lan command can garner information about specific hardware and configuration settings of your client. By contrast, wireless authentication uses the netsh wlan command.
Tip: The netsh lan command can garner information about specific hardware and configuration settings of your client. By contrast, wireless authentication uses the netsh wlan command.