Chapter 11 - Authentication And Account Management Flashcards

1
Q

Authentication

A

Proving that a user is genuine, and not an imposter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication credentials

A

1) what he has
2) what he is
3) what he knows
4) where he is
5) what he does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Online attack

A

An attempt to enter different passwords at the login prompt until the right password is guessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Offline attack

A

Stealing a message digest database and cracking it offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NTLM (New Technology LAN Manager) hash

A

A hash used by modern Microsoft Windows operating systems for creating password digests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pass the hash attack

A

An attack in which the user sends the hash to the remote system to then be authenticated on an NTLM system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mask attack

A

A more targeted brute force attack that uses placeholders for characters in certain positions of the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rule attack

A

Conducts a statistical analysis on the stolen passwords that is then used to create a mask to break the largest number of passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dictionary attack

A

A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rainbow tables

A

Large pre-generated data sets of encrypted passwords used in password attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Key stretching

A

A password hashing algorithm that requires significantly more time than standard hashing algorithms to create the digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 popular key stretching password hash algorithms

A

1) bcrypt

2) PBKDF2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multifactor authentication

A

Using more than one type of authentication credential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security token

A

A means of authentication based on a token that the user has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware security token

A

A small device (usually one that can be affixed to a keychain) with a window display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software security token

A

Software stored in a general-purpose device like a laptop computer or smartphone.

17
Q

Time-based one-time password (TOTP)

A

A one-time password that changes after a set period.

18
Q

HMAC-based one-time password (HOTP)

A

A one-time password that changes when a specific event occurs.

19
Q

Smart card

A

A card that contains an integrated circuit chip that can hold information used as part of the authentication process.

20
Q

Proximity card

A

A contactless card that does not require physical contact with the card itself for authentication.

21
Q

Common access card (CAC)

A

A U.S department of defense (DoD) smart card used for identification of active-duty and reserve military personnel along with civilian employees and special contractors.

22
Q

Personal Identity Verification (PIV)

A

A U.S government standard for smart cards that covers all government employees.

23
Q

Standard biometrics

A

Using fingerprints or other unique physical characteristics of a persons face, hands, or eyes for authentication.

24
Q

Retinal scanner

A

A device that uses the human retina as a biometric identifier.

25
Fingerprint scanner
A device that uses fingerprints as a biometric identifier.
26
Iris scanner
Using a standard computer webcam to map the unique characteristic of the iris for authentication.
27
Facial recognition
A biometric authentication that is becoming increasingly popular in smartphones that views the users face.
28
Cognitive biometrics
Relates to the perception, thought process, and understanding of the user.
29
Behavioral biometrics
Authentication that is based on actions that the user is uniquely qualified to perform, or something you do.
30
Keystroke dynamics
A type of behavioral biometrics which attempts to recognize a users unique typing rhythm.
31
Geolocation
A type of authentication based on where the user is located, or somewhere you are. It is the identification of the location of a person or object using technology.
32
Federation
Single sign-on for networks owned by different organizations, also called federated identity management (FIM)
33
Single sign-on (SSO)
Using one authentication credential to access multiple accounts or applications.
34
Credential management
Managing the login credentials such as passwords in user accounts.
35
Group policy
A preferred approach is to assign privileges by group instead of individually.