Week 3 - Authentication Flashcards

1
Q

What are the 3 a’s of cybersecurity?

A
  1. Authentication (proving you are who you are)
  2. Authorization (granting access)
  3. Accounting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you safeguard against potential undetected compromise of passwords?

A

a password rotation policy (but not too short or encourages poor security behavior)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is multifactor authorization?

A

users are authenticated by providing multiple pieces of info or objects (like codes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 5 types of authentication methods?

A
  1. Something you know - password or pin number
  2. Something you have - bank card, USB device, key fob, or OTP (one-time password)
  3. Something you are - biometric data, like a fingerprint, voice signature, facial recognition, or retinal scan
  4. Somewhere you are - geofencing, GPS, Indoor Positioning Systems (IPS), NFC scanning, geolocation
  5. Something you do - gestures, swipe patterns, CAPTCHA, or patterns of behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is more secure, iris or retinal scanning?

A

Retinal scanning (iris they can just use a photo)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are client certificates?

A

allow servers to authenticate and verify clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Certificates are ____ keys

A

public keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Certificates are signed by a….?

A

certificate authority or CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In order to issue client certificates, an organization must?

A

setup and maintain CA infrastructure to issue and sign certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a certificate revocation list (CRL)?

A

a signed list published by the CA (certificate authority) which defines certificates that have been explicitly revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does RADIUS stand for?

A

Remote authentication dial-in user service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is RADIUS?

A

a protocol that provides AAA (authentication, authorization, accounting) services for users on a network

[the 3 a’s of cybersecurity]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are tickets?

A

a sort of token that proves your identity

(tickets are used by Kerberos for example)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is TACACS+ mainly used for?

A

authentication system for network infrastructure services (device AAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly