Chapter 2 Flashcards
(170 cards)
Authentication proves:
an identity with some type of credentials such as a username and password
What works together with identification to provide a comprehensive access management system?
Authentication
Authorization
Accounting
(AAA)
Define authorization:
access to resources based on their proven identity
Accounting methods:
track user activity and record the activity in logs
An audit trail allows:
security professionals to re-create the events that preceded a security incident
Implement one factor of authentication for:
basic authentication
Implement two factors of authentication for:
secure authentication
Implement three factors of authentication for:
higher security
Some factors of authentication are:
something you know
something you have
something you are
somewhere you are
something you do
Something you know authentication factor refers to:
a shared secret, such as a password or even a PIN
A strong password is:
of sufficient length, doesn’t include words found in a dictionary or any part of a user’s name, and combines at least three of the four following character types:
Uppercase characters (26 letters A-Z)
Lowercase characters (26 letters a-z)
Numbers (10 numbers 0-9)
Special characters (32 printable characters, such as !, $, and *)
Microsoft began recommending a best practice of setting the minimum password length to at least:
14 characters
You can calculate the key space with the following formula:
n
C^N(C )
Security experts often mention that if you make a password too complex you make it:
less secure
Windows domains use Group Policy to:
manage multiple users and computers in a domain.
Group Policy allows an administrator to configure a setting once in a:
Group Policy Object (GPO) and apply this setting to many users and computers within the domain
Active Directory Domain Services (AD DS) is a:
directory service Microsoft developed for Windows domain networks
The great strength of Group Policy comes when you implement it in a:
Microsoft domain
Organizational units (OUs) are used when:
Administrators use Group Policy to target specific groups of users or computers
Password policies typically start as:
a written document that identifies the organization’s security goals related to passwords
Password policy definitions:
Enforce password history
remembers past passwords and prevents the user from reusing previously used passwords
Password policy definitions:
Maximum password age
defines when users must change their password
Password policy definitions:
Minimum password age
defines how long users must wait before changing their password again
Password policy definitions:
Minimum password length
enforces the character length of the password