Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
35 Cards in this Set
- Front
- Back
What is happening when a user types their name on the screen? |
This is the identification part of authentication. |
|
From a security perspective both the ______ and __________ should be identified? |
Both the User and Server are identified and it is called Mutual Authentication. |
|
What are the five Factors that can be used to authenticate an individual? |
|
|
Explain the three multi-factor methods of Authentication. |
|
|
How are multifactor Authentication schemes determined? |
Then number of authentication factors used i.e. something you know/do/are/have or somewhere you are. |
|
Single Sign-On SSO is the concept of using _________ to access multiple systems? |
A single sign-on to access multiple systems. |
|
The drawbacks of SSO are? |
Hack one hack all. |
|
What are Access Tokens? |
A soft i.e. (logical) token created when a user logs in that has the following:
|
|
You have added a user to a new group, but they do not have any access rights. What is the most likely cause of the problem. |
The new user probably needs to log off and log on again to obtain an access token for the qroup. |
|
Name four Authentication Protocols used in Windows? |
|
|
What are the Remote Access authentication RAS and VPN? |
|
|
What is the PAP authentication protocols? |
|
|
What are three steps of the Challenge Handshake (CHAP) authentication protocol?
|
|
|
What is the MS-CHAP authentication protocols? |
A variation of CHAP protocol that uses MD4 versus MD5 along with Microsoft Point-to-Point Encryption (MPPE) to encrypt all traffic from the client to the server. |
|
What is the MS-CHAPv2 authentication protocols?
|
A variation of MS-CHAP that authenticates both the client and the server using stronger encryption keys |
|
What is the (EAP) Extensible authentication protocols?
|
It allows for multiple logon methods such as smartcard logon, certificates Kerberos and public-key authentication it is also used with RADIUS. |
|
RADIUS is a central authentication service that can be used with which other protocols? One drawback of RADIUS is? |
This central authentication can be used with RAS, wireless or VPN solutions. It encrypts only the password. |
|
What are three aspects of the Authentication Services (AAA)? |
|
|
Name three AAA services? |
|
|
Radius uses which transport layer protocol and which ports? |
|
|
Name two Authentication protocols that use applications to authenticate to a directory and then to retrieve information about objects in the directory? |
Lightweight Directory Addess Protocol (LDAP) LDAP (uses TCP port 389) and secure LDAP (uses TCP port 636) and is encrypted |
|
Name two Authentication protocols that generate passwords? How are they different? |
Time-based One Time Password (TOTP) generated based on Current Time while and HOTP is based on the Hash Message Authentication Code HMAC-based involves the use of a hashing code. |
|
Which Authentication protocol is an XML standard designed for authentication and authorization often used with identity federation. |
SAML Security Assertion Markup Language. |
|
What is Federation Authentication protocol? |
A term used to authenticate and authorize users across organizations and application boundaries through the use of an Identity Management system. Note: In FID, a user's credentials are always stored with the "home" organization (the "identity provider") |
|
Which two Authentication protocols are based on trust. |
|
|
Implicit Deny Authentication protocol is based on |
Denying anyone access to a system until they are authenticated. |
|
What is the most common form of authentication? |
Unique user name and password. |
|
What is the difference between authentication and identification? |
Identification is presenting documents to show identify and authentication is proving your identity by knowing a password. |
|
What are the three major token types? |
|
|
What is the most secure Biometric authentication? |
Iris scan which scans the colored part of the eye. |
|
What does the Retina scan do? |
Scans the pattern of blood vessels around the retins |
|
Name types of Biometric Errors? |
|
|
What is the crossover error rate (CER) |
Measurement of the accuracy of a biometric device. |
|
What are two types of smart cards? |
|
|
When using a VPN to connect to a RADIUS server the VPN is called the? |
RADIUS client. |