Chapter 4 Access Control, Authentication, and Authorization Flashcards
(33 cards)
What does TACACS stand for?
Terminal Access Controller Access-Control System
TACACS is ___ -oriented environment
Client/Server
The most current version of TACACS is ___
TACACS +
A ____ allows you to create groups of users and systems and segment them on the network.
VLAN
Virtual Local Area Network
IPSec provides _______
secure authentication and encryption of data and headers
PPP doesn’t provide ___
Data security
A __ connection allows remote users to log on to the network and have access as though they were local users on the network
Point to point protocol (PPP)
___ works by encapsulating the network traffic in a protocol called ____. Authentication is handled by the ____
PPP/Network Control Protocol (NCP) / Link Control Protocol (LCP)
You should use ___ when you want to improve network security by implementing a single service to authenticate users who connect remotely to the network.
RADIUS
The major difficulty with a single-server RADIUS environment is
Is that the entire network may refuse connections if the server malfunctions.
____ Is a standardized directory access protocol that allows queries to be made of directories.
Lightweight Access Directory Protocol
LDAP operates at port ___
389
With secure LDAP (LDAPS) all LDAP communications are encrypted with ___ and port ___ is used.
SSL/TLS Port 636 is used.
Kerberos authentication uses a _____
Key distribution Center (KDC)
The ticket granted in Kerberos is valid up to __ hours
10
What is TGT?
Ticket Granting Ticket
What is SSO
Single Sign On
What are the four primary methods of access controls?
MAC (Mandatory Access Control)
DAC(Discretionary Access Control)
Role-based Access Control (RBAC)
Rule-Based Access Control (RBAC)
___ Means that any given user (or system) is given the minimum privileges necc
Least Privileges
___ is a process to determine whether a users access level is still appropriate.
Access Review
___ implies an ongoing audit of what resources a user actually actually accesses.
Continuous Monitoring
A ___ card itself usually contains a small amount of memory that can be used to store permissions and access information
Smart card
_ is a protection feature built into many firewalls that allows the administrator to tweak the tolerance for unanswered attacks.
Flood Guard
A ___ makes it possible to lessen the likelihood of a successful DoS attack.
Flood Guard