4.2 Flashcards

1
Q

What does AAA stand for?

A

Authorization, Authentication and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the AAA framework steps to get access to a network device?

A
  1. Identification(usually the username/who we are)
  2. Authentication(usually the password/prove who we are)
  3. Authorization(based on the identification and authentication, what access do we have?)
  4. Accounting(resources used: Login time, data sent and received, logout time)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does RADIUS stand for?

A

Remote Authentication Dial-in User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does RADIUS do?

A

Its one of more common AAA protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats an example of RADIUS?

A

centralize authentication for users like routers, switches, firewalls, remote VPN access since RADIUS services are available on almost any server operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does TACACS stand for?

A

Terminal Access Controller Access-Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does TACACS do?

A

It’s an alternative to RADIUS aremote authentication protocol created to control access to dial-up lines to APRANET.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whats XTACACS?

A

(Extended TACACS) It’s an additional support for accounting and auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whats TACACS+?

A

Latest version of TACACS which offers more authentication requests and response codes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Kerberos?

A

They are a network authentication protocol which only authenticates once and once it’s trusted by the entire system, they wont be a need to re-authenticate to everything.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SSO stand for?

A

Single Sign-On and it’s part of the kerberos which authenticates one time. This means no constant username and password input to save time. It only works with Kerberos protocols, but not everything is kerberos-friendly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is LDAP used for?

A

It’s the protocol for reading and writing directories over an IP network(an organized set of records, like a phone directory(LDAP uses tcp/389 and udp/389)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whats the use of local authentication?

A

Credentials are stored on the local device(doesnt use a centralized database). Most devices include an initial account. Its difficult to scale local accounts(no centralized administration so everything must be added or changed on all devices) but its useful as a backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are certificates used for?

A

They are used in certificate-based authentications like smart cards(private key is on the card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Whats a PIV card?

A

(Personal Identity Verification card) It’s a US Federal Government smart card with picture and identification info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whats a CAC?

A

(Common Access Card) It is used by US Department of Defense smart card with picture and identification.

17
Q

Whats IEEE 802.1X used for?

A

To gain access to the network using a certificate that is stored on a device or a separate physical device.

18
Q

What is auditing used for?

A

With the logged information, we can see how are our resources used or are our systems and applications secure?(Like time-of-day restrictions that we can apply to a lab that nobody uses at 3 am.

19
Q

What is multi-factor authentication?

A
It's when more than one factor is used to authenticate:
Something you are
something you have
something you know
somewhere you are
something you do
20
Q

Whats an example of something you know?

A

Password, PIN and pattern

21
Q

Whats an example of something you have?

A

Smart card, USB token,pseudo random authentication code for hardware or software and SMS to a phone with a code.

22
Q

Whats an example of something you are?

A

Biometric authentication(Not foolproof)

23
Q

Whats an example of somewhere you are?

A

Provide a factor based on your location, IP address(works with IPv4 and not so much with IPv6) and mobile device locations services(needs to be able to receive GPS info)

24
Q

Whats an example of something you do?

A

A personal way of doing things, handwriting analysis, typing technique
(these are very similar to biometrics which means close to something you are)

25
Q

Whats 802.1X?

A

It’s a port based(physical interfaces not tcp or udp) NAC(Network Access Control) which means clients dont get access until you authenticate. 802.1X uses EAP and RADIUS, but also we need to disable our unused ports and duplicate the MAC address checking.

26
Q

Whats port security?

A

It prevents unauthorized users from connecting to a switch interface(it will alert or disable the port) which works based on the source MAC address. Each port has its own config.

27
Q

How does port security work?

A
  1. Configure a maximum number of source MAC addresses on an interface.
  2. The switch monitors the number of unique MAC addresses.
  3. Once you exceed the maximum, port security activities.
28
Q

Whats MAC filtering?

A

(Media Access Control) It’s the limitation of access through the physical hardware address. To find the working MAC addresses through packet captures

29
Q

What is captive portal?

A

It’s an authentication to a network which is common in wireless networks.

30
Q

How does the captive portal work?

A

After our device is connected to a network, access table recognizes a lack of authentication and redirects us to a captive portal page where it asks for username and password. Once proper authentication is validated, the web session continues(until captive portal removes our access)

31
Q

Whats ACL used for?

A

(Access Control Lists) It’s used to allow or deny traffic. They are applied to routers or switch interfaces and are defined on the ingress or egress of an interface. ACLs evaluate on certain criteria(like source IP, destination IP, ICMP, TCp port numbers, UDP port numbers).