• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back
What provides confidentiality by encrypting data?
Cryptography
Preventing unauthorized disclosure through encryption.
Confidentiality
Verify that data has not been modified with hashing or message authentication codes.
Integrity
What is a number created by applying an algorithm to a file or message?
Hash
What does the following acronym stand for?

MAC used for integrity similar to how a hash is used.
Message Authentication Code
What does the following acronym stand for?

MAC model as one of the three testable access control models.
Mandatory Access Control
What does the following acronym stand for?

MAC addresses that are the physical addresses to NICS.
Media Access Control
Naloxone
Dosing--Stever
1-4 mcg/kg
What is a commonly used authentication protocol within a Windows Active Directory domain or UNIX realm? It uses a database of objects such as Active Directory and a KDC to issue time-stamped tickets and, and requires internal time synchronization.
Kerberos
What uses port 88?
Kerberos
What uses ports 389 and 636?
Lightweight Directory Access Protocol (LDAP)
What enhances security by requiring users to use and remember only one set of credentials for authentication? This one set of credentials is then used throughout a user's entire session.
Single-sign-on (SSO)
What is used to authenticate Microsoft clients and includes mutual authentication?
Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAPv2)
What is used by CISCO and UNIX for authentication and can use Kerberos, allowing it to interact with a Microsoft environment? This also encrypts the entire authentication process.
Terminal Access Controller Access-Control System Plus
(TACACS+)
What uses port 49?
Terminal Access Controller-Access-Control System and Terminal Access Controller-Access-Control System Plus

(TACACS and TACACS+)
Ensuring that data and services are available when needed.
Availability
Preventing someone from denying an action through the use of logging or digital signatures.
Non-repudiation
Employing several layers of security
Defense in depth
Specifically allowing certain traffic or permissions and blocking everything else.
Implicit deny
Use security devices such as firewalls only for security purposes.
Use devices as intended.
Three factors of authentication
Something you know (such as a username and password)
Something you have (such as a smart card or key fob)
Something you are (using biometrics)
Employs two or more of the three authentication factors
Multifactor authentication
The authentication mechanism used in domains and UNIX realms. Requires KDC to issue time-stamped tickets and uses port 88.
Kerberos
Two hosts authenticate each other before sharing information.
Mutual Authentication
Users are issues a single user account, which can access multiple resources on a network.
Single sign-on
Remote Access authentication method that is rarely used since passwords are passed in clear text.
Password Authentication Protocol
(PAP)
Remote Access authentication method that uses a challenge response authentication process.
Challenge Handshake Authentication Protocol
(CHAP)
Remote access authentication protocol that provides a central authentication for multiple RAS servers. It encrypts the password during the authentication process.
Remote Authentication Dial-In User Service
(RADIUS)