• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/72

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

72 Cards in this Set

  • Front
  • Back
What is:



Identification
Finding out who someone is
What is:



Authentication
A mechanism of verifying identification
What are the:



Five factors of authentication:
Something you know (i.e. a password or pin)
Something you have (i.e. a smart card, token, or identification device)
Something you are (i.e. biometrics)
Something you do (such as an action you must take to complete authentication)
Somewhere you are (geolocation)
What is:



Single–Factor Authentication (SFA)
Only one type of authentication is checked
What is:



Multi–Factor Authentication
When two or more access methods are included as part of the authentication process. (Access methods should not be from the same categories, i.e. don’t use a PIN and password as these are both “something you know”)
What is a:



Federation
A collection of computer networks that agree on standards of operation, such as security.
What is the:


Password Authentication Protocol (PAP)
An old system that is no longer used. Sends username and password in plaintext
What is the:



Shiva Password Authentication Protocol (SPAP)
Replaced PAP. Encrypts username and password
What is the:



Challenge Handshake Authentication Protocol (CHAP)
as designed to stop man–in–the–middle attacks. During the initial authentication, the connecting machine is asked to generate a random number (usually a hash) and send it to the server. Periodically the server will challenge the client machine, demanding to see that number again.
What is a:


Time–Based One–Time Password (TOTP)
A unique password that is created by an algorithm that uses a time–based factor.
What is a:



HMAC–Based One–Time Password (HOTP)
A password that is created using a Hash Message Authentication Code (HMAC) algorithm
What is a:



Terminal Access Controller Access–Control System (TACACS)
A client/server–oriented environment that operates in a manner similar to RADIUS
What is a:



Extended Terminal Access Controller Access–Control System (XTACACS)
A client/server–oriented environment that operates in a manner similar to RADIUS, it replaced TACACS and combined authentication and authorization with logging to enable auditing
What is a:



Extended Terminal Access Controller Access–Control System+ (TACACS+)
The most current method of TACACS. Allows credentials to be accepted from multiple methods, including Kerberos.
What is the:



Security Assertion Markup Language (SAML)
An open standard based on XML that is used for authentication and authorization data
What is:



Kerberos
An authentication protocol. Allows for single sign–on to a distributed network
What is a:



Key Distribution Center (KDC)
Authenticates the principal (user, system, or program) and provides it with a ticket. The ticket can be used to authenticate against other principals
What is a:



Ticket Granting Ticket (TGT)
Lists the privileges that a user has. Is encrypted and has a time limit of up to 10 hours
What is:



Single Sign–On (SSO)
Gives users access to all application and systems they need when they log in instead of requiring a login for each application or system
What are the:



Four Primary methods of access control
MAC – Mandatory Access Control – All Access is predefined
DAC – Discretionary Access Control – Incorporates some flexibility
RBAC – Role–Based Access Control – Allows the user’s role to dictate access capabilities
RBAC – Rule–Based Access Control – Uses preconfigured policies
What is:



Least Privilege
A given user (or system) is given the minimum privileges necessary to accomplish his or her job.
What are:



Access Control Lists (ACLs)
Enable devices in your network to ignore requested from specified users or systems, or to grant them access to certain network capabilities
What is:



Implicit Deny
If the request in question has not been explicitly granted, then access is denied
What are the:



Three areas of port security
MAC Limiting and Filtering – Limit access to the network to MAC address that are known, and filter out those that are not
802.1X – Port–based security for wireless network access control. Offers a means of authentication
Unused Ports – All unused ports should be disabled
What is a:



Trusted Operating System (TOS)
Any operating system that meets the government’s requirements for security.
What are the:



Evaluation Assurance Levels (EALs)
A comprehensive set of evaluation criteria (for operating systems) that is broken down into 7 levels. The levels are EAL 1 (least secure) to EAL 7 (most secure).
What is:

Mutual Authentication
When two or more parties authenticate each other.
What is a:


Federated Identity
A means of linking a user's identity with their privileges in a manner that can be used across business boundaries (i.e. Google checkout).
What is:


Transitive access
One party (A) trusts another party (B). If the second party (B) trusts another party (C), then a relationship can exist where the first party (A) also may trust the third party (C).
What is a:

Remote Authentication Dial–In User Service (RADIUS)
A mechanism that allows authentication of remote and other network connections.
What is a:

Common Access Card (CAC)
A card that is issued by the DoD as a general identification/authentication card for military personnel, contractors, and non–DoD employees
What is a:


Personal Identity Verification Card (PIVC)
A card that is issued to all U.S. government employees and contractors and will be required to can access (physical and logical) to government resources.
What is a


Token
Similar to certificates, they are used to identify and authenticate the user. They contain the rights and access privileges of the token bearer as part of the token.
What is a


Flood Guard
A protection feature built into many firewalls that allows the administrator to tweak the tolerance for unanswered login attacks. Reducing this tolerance makes it possible to lessen the likelihood of a successful DoS attack.
What is


Loop Prevention
Works in layer 2 switching configurations and is intended to prevent broadcast loops.
What is

Network Bridging
When a device has more than one NIC and the opportunity presents itself for a user on one of the networks to jump to the other network.
What is:


802.11x
A family of protocols that provides for wireless communications using radio frequency transmissions. It uses the 2.4 GHz and 5GHz frequency spectrum.
What is:


802.11
A standard that defines wireless LANs transmitting at 1Mbps or 2Mbps bandwidth using the 2.4 GHz frequency.
What is:


802.11a
A standard that provides wireless LAN bandwidth of up to 54 Mbps in the 5 GHZ frequency.
What is:


802.11b
A standard that provides wireless bandwidth of up to 11 Mbps (with fallback rates of 5.5, 2, and 1 Mbps) on the 2.4 GHz frequency. It is also called Wi–Fi or 802.11 high rate.
What is:



802.11g
A standard that provides for bandwidths of up to 54 Mbps in the 2.4 GHz frequency. Though able to obtain faster speeds, it suffers from the same interference problem of having to are the spectrum with other devices using that frequency.
What is:


802.11i
A standard that provides for security enhancements to the wireless standard with particular focus on authentication. Often referenced as WPA2.
What is:


802.11n
The most popular standard. It operates in both the 5 and 2.4 GHz ranges. Speeds can reach 600 Mbps. It offers higher speed and a frequency that does not have as much interference.
What is:


Wired Equivalent Privacy (WEP)
A wireless protocol designed to provide a privacy equivalent to that of a wired network. Vulnerable because of a weak IV of only 24–Bits.
What is an:



Initialization vector (IV)
An arbitrary number that can be used along with a secret key for data encryption
What is the:


Temporal Key Integrity Protocol (TKIP)
A 128–bit wrapper around WEP encryption with a key that is based on things such as the MAC address of the destination device and the serial number of the packet.
What is the:


Wireless Application Protocol (WAP)
A technology designed for use with wireless devices. It has become a data transmission standard. Uses a smaller version of HTML called WML. Uses a WAP gateway system to convert information from WAP to HTTP and back.
What is the:


Wireless Markup Language (WML)
A smaller version of HTML, it is used for internet displays over wireless.
What is:


Wi–Fi Protected Access (WPA)
A technology that was designed to address the core problems of WEP. It implements most, but not all, of 802.11i for backwards comparability. It also uses TKIP.
What is:


Wi–Fi Protected Access 2 (WPA2)
A technology that was designed to address the core problems of WEP. It implements the full 802.11i standard and is not compatible with older devices. It also uses CCMP.
What is the :


Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (A.k.a. Counter Mode CBC–MAC Protocol or CCMP)
An encryption protocol that uses a 128–bit AES encryption with a 48–bit IV.
What is:

Wireless Transport Layer Security (WTLS)
The security layer of WAP. It provides authentication, encryption, and data integrity for wireless devices.
What are:


The 3 levels of security that exist in WAP
Anonymous Authentication – Virtually anyone can connect.
Server Authentication – Requires the workstation to authenticate against the server.
Two–Way Authentication – Requires both the client and server to authenticate.
What is the:


Wireless Session Protocol (WSP)
Manages the session information and connection between the devices.
What is the:


Wireless Transaction Protocol (WTP)
Provides services similar to TCP and UDP for WAP.
What is the:

Wireless Datagram Protocol (WDP)
Provides the common interface between devices.
What is a:


(Wireless) Access Point (AP)
A low power transmitter/receiver which is strategically placed for access.d
What is a:

Captive portal
Requires that users agree to some condition before they use the Wi–Fi hotspot.
What is the:


Extensible Authentication Protocol (EAP)
Provides a framework for authentication that is often used with wireless network.
What are:


The 5 EAP types adopted by the WPA/WPA2 standard
EAP–TLS
EAP–PSK
EAP–MD5
LEAP
PEAP
What is:


Extensible Authentication Protocol Tunneled Transport Layer Security (EAP–TTLS)
Adds one more layer of security against man–in–the–middles attacks and eavesdropping by adding tunneling.
What is:


Wi–Fi Protected Setup (WPS)
Used to simplify network setup, it often requires users to do something in order to complete enrollment (i.e. press a button on the router, enter a PIN, etc). The technology is susceptible to brute–force attacks.
What is the:


Lightweight Extensible Authentication Protocol (LEAP)
Created by Cisco as an extension to EPA. It is being phased out as it is a proprietary protocol to Cisco and lacks native Windows support. LEAP requires mutual authentication, but is susceptible to dictionary attacks.
What is the:


Protected Extensible Authentication Protocol (PEAP)
Replaces LEAP and has native support for Windows. It is more secure than EAP–TTLS as it establishes an encrypted channel between the client and server.
What is a:


Site Survey
Used by admins to determine if a proposed location is free of interference. When used by an attacker a site survey can determine what types of systems are in use, the protocols used, and other critical information about a network.
What is:

Jamming
Intentional interference meant to jam a signal and keep legitimate devices from communicating.
Define:


War Driving
Driving around, with a wireless device, looking for APs to communicate with.
Define:

War Chalking
A way to notify others that a wireless vulnerability exists here. Can be on the sidewalk, the side of the building, etc.
What is a:


Rogue Access Point
Any wireless access point added to the network that is not authorized.
What is an:


Evil Twin Attack
An attack in which a rouge access point poses as a legitimate wireless access point in the hopes of intercepting information that users transmit.
What is:


Bluejacking
The sending of unsolicited messages over a Bluetooth connection (spam).
What is:


Bluesnarfing
The gaining of unauthorized access through a bluetooth connection.