Access Control ch 5 Flashcards

1
Q

OTP

A

One time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SAML

A

Security Assessment Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Oath

A

Your word to work within ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tacacs/tacacs+/xtacacs

A

This is a client server oriented environment, and it operates in a manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5 primary methods of control

A

MAC-mandatory access control-all access predefined
DAC-discretionary access control- incorporates some flexibility
RBAC-role based all the users role to dictate access capabilities
RBAC-rule based-limits user to preconfigured policies-Dental but those on this list/ or spec appear
ABAC-Attribute-based-considers all of the various attributes associated w the subject and object in making the access control decision. Nist 800-162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Smart cards-Difficult to counterfeit

Piv-personal identification verification card

A

End of chapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless threat terms

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

802.1x

A

Ieee standard that defines port-based security for wireless network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

Access point-point at which access to a network is accomplished.often in relation to a wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bluejacking

A

The sending of unsolicited messages over a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bluesnarfing

A

Gaining of unauthorized access through a Bluetooth connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disassociation

A

And attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network

Dos attack de authentication attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evil twin

A

And attack in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Interference

A

The byproduct of electrical processes. One common form of interference is radio frequency interference (RFI), which is usually projected across a radio spectrum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IV attack

A

And attack that involves looking at repeated results in order to crack the WEP secret key.
Initialization vector in wired equivalent privacy RC4 encryption 24 bit
TKIP temporal key integrity protocol was employed to strengthen wep. 128 bit based on MAC address of destination device and sn of the packet. Backward compatible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jamming

A

Purposely obstructing or interfering w a signal

17
Q

RFID

A

Radio frequency identification a technology that incorporates the use of electromagnetic coupling in the radio frequency portion of the spectrum to identify items uniquely(object, animal, person, credit cards)

18
Q

NFC

A

Technology that enables communications between devices when they’re “touched” together. Often used to verify that the device is present.

19
Q

Replay attack

A

And attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection

20
Q

Rogue access point

A

Unauthorized

21
Q

SSID

A

Service set identifier is used by the access point of a wireless LAN to identify itself and is intended to be unique for a particular area/entity on a network

22
Q

Wi-FI

A

A wireless network operating 2.4 ghz or 5ghz range

23
Q

WPS

A

authenticition

24
Q

WEP

A

802.11b wireless

25
Q

Wap

A

Rf clients