5.8 Authentication, Authorization, and Accounting Concepts Flashcards

Examine authentication, authorization, and accounting concepts. (23 cards)

1
Q

What does the acronym AAA signify in the context of user security?

A

Authentication, Authorization, and Accounting

AAA encompasses the processes of verifying user identity, determining access rights, and tracking user actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define:

Authentication

A

The process of verifying the identity of a user or device.

Authentication is the first step in network access control, where a user or device provides credentials (e.g., username and password) to prove their identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is Authorization important after Authentication?

A

It determines what actions a verified user is permitted to perform.

After authentication, the system checks the user’s permissions to control their access to specific resources and actions based on their credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Authentication differ from Authorization?

A

Authentication verifies who you are, while authorization determines what you can do.

Authentication confirms the identity of a user, while authorization grants or denies access to specific resources based on their identity and roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does Authentication primarily rely on to verify user identity?

A

Credentials like a username and password, or multifactor authentication.

Authentication ensures the entity requesting access is who they claim to be by checking their provided credentials against a stored database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is Authorization considered a separate process from Authentication?

A

Authorization determines what authenticated users can access or do.

While authentication confirms a user’s identity, authorization decides what the user is allowed to access or perform once their identity is confirmed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the three main factors in authentication.

A
  1. Something you know (password, PIN)
  2. Something you have (smart card, token)
  3. Something you are (biometric data)

These three factors provide multiple layers of security, making it more difficult for unauthorized users to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol is commonly used for AAA in Cisco devices?

A

TACACS+ and RADIUS

TACACS+ and RADIUS are both AAA protocols used to manage user authentication, authorization, and accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For using a Cisco-specific AAA server, which protocol is recommended?

A

TACACS+

TACACS+ is a Cisco proprietary protocol designed for authentication, authorization, and accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of authentication system typically incorporates one-time passwords?

A

Multifactor authentication

Multifactor authentication enhances security by requiring multiple forms of verification, such as a password and a one-time password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of RADIUS in AAA?

A

It handles authentication and authorization.

RADIUS is typically used for remote access authentication and authorization, handling requests for network devices such as routers and switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False:

Authorization is the first step in the AAA framework.

A

False

Authentication is the first step, followed by authorization, and then accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank:

The process of recording user actions and behaviors after authentication and authorization is called ______.

A

accounting

Accounting logs user activities, which are essential for understanding what occurred during a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of Accounting in AAA?

A

It logs user activities for auditing and reporting purposes.

After a user authenticates and is authorized, accounting tracks their usage of network resources, which is useful for security audits and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does TACACS+ offer that RADIUS does not?

A

TACACS+ separates authentication, authorization, and accounting.

TACACS+ provides more granularity and flexibility, allowing for separate handling of each AAA function, which makes it more secure than RADIUS for devices that require more detailed control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In an 802.1x EAP authentication setup, which device evaluates user credentials for access permission?

A

Authentication server

The authentication server, often a RADIUS server, is responsible for validating user credentials in this authentication framework.

17
Q

What does the term “EAP” stand for?

A

Extensible Authentication Protocol

EAP is used in 802.1x for network access control, where it allows for various authentication methods such as certificates, smart cards, and passwords.

18
Q

Which AAA protocol is more commonly used in remote access VPNs?

A

RADIUS

RADIUS is commonly used for remote access authentication in VPNs because it supports a large number of clients and is more lightweight than TACACS+.

19
Q

True or False:

RADIUS supports authentication and accounting, but not authorization.

A

False

RADIUS supports authentication, authorization, and accounting, but TACACS+ offers more flexibility and security for each of these functions by separating them.

20
Q

How does 802.1x authentication work with AAA protocols?

A

It uses RADIUS or TACACS+ for authentication and authorization.

802.1x relies on AAA protocols to validate user credentials and grant or deny access to the network based on authentication and authorization.

21
Q

How is Accounting implemented in a network audit?

A

It logs the details of user activity for review.

Accounting records user actions, such as login and logout times, resource usage, and the amount of data transferred, allowing for auditing and tracking of user behavior.

22
Q

Whats the importance of Accounting in troubleshooting network issues?

A

It provides logs that help identify and resolve issues.

Accounting logs help network administrators track user actions and pinpoint issues such as unauthorized access or resource misuse, which aids in troubleshooting.

23
Q

Define:

Role-Based Access Control (RBAC)

A

A system where access is based on roles within an organization.

RBAC simplifies authorization by grouping users into roles (e.g., admin, user) and assigning permissions to those roles instead of individual users.