Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
28 Cards in this Set
- Front
- Back
What provides confidentiality by encrypting data?
|
Cryptography
|
|
Preventing unauthorized disclosure through encryption.
|
Confidentiality
|
|
Verify that data has not been modified with hashing or message authentication codes.
|
Integrity
|
|
What is a number created by applying an algorithm to a file or message?
|
Hash
|
|
What does the following acronym stand for?
MAC used for integrity similar to how a hash is used. |
Message Authentication Code
|
|
What does the following acronym stand for?
MAC model as one of the three testable access control models. |
Mandatory Access Control
|
|
What does the following acronym stand for?
MAC addresses that are the physical addresses to NICS. |
Media Access Control
|
|
Naloxone
Dosing--Stever |
1-4 mcg/kg
|
|
What is a commonly used authentication protocol within a Windows Active Directory domain or UNIX realm? It uses a database of objects such as Active Directory and a KDC to issue time-stamped tickets and, and requires internal time synchronization.
|
Kerberos
|
|
What uses port 88?
|
Kerberos
|
|
What uses ports 389 and 636?
|
Lightweight Directory Access Protocol (LDAP)
|
|
What enhances security by requiring users to use and remember only one set of credentials for authentication? This one set of credentials is then used throughout a user's entire session.
|
Single-sign-on (SSO)
|
|
What is used to authenticate Microsoft clients and includes mutual authentication?
|
Microsoft Challenge Handshake Authentication Protocol Version 2 (MS-CHAPv2)
|
|
What is used by CISCO and UNIX for authentication and can use Kerberos, allowing it to interact with a Microsoft environment? This also encrypts the entire authentication process.
|
Terminal Access Controller Access-Control System Plus
(TACACS+) |
|
What uses port 49?
|
Terminal Access Controller-Access-Control System and Terminal Access Controller-Access-Control System Plus
(TACACS and TACACS+) |
|
Ensuring that data and services are available when needed.
|
Availability
|
|
Preventing someone from denying an action through the use of logging or digital signatures.
|
Non-repudiation
|
|
Employing several layers of security
|
Defense in depth
|
|
Specifically allowing certain traffic or permissions and blocking everything else.
|
Implicit deny
|
|
Use security devices such as firewalls only for security purposes.
|
Use devices as intended.
|
|
Three factors of authentication
|
Something you know (such as a username and password)
Something you have (such as a smart card or key fob) Something you are (using biometrics) |
|
Employs two or more of the three authentication factors
|
Multifactor authentication
|
|
The authentication mechanism used in domains and UNIX realms. Requires KDC to issue time-stamped tickets and uses port 88.
|
Kerberos
|
|
Two hosts authenticate each other before sharing information.
|
Mutual Authentication
|
|
Users are issues a single user account, which can access multiple resources on a network.
|
Single sign-on
|
|
Remote Access authentication method that is rarely used since passwords are passed in clear text.
|
Password Authentication Protocol
(PAP) |
|
Remote Access authentication method that uses a challenge response authentication process.
|
Challenge Handshake Authentication Protocol
(CHAP) |
|
Remote access authentication protocol that provides a central authentication for multiple RAS servers. It encrypts the password during the authentication process.
|
Remote Authentication Dial-In User Service
(RADIUS) |