Chapter 2 first half Flashcards

(44 cards)

1
Q

Occurs when users claim (or profess) their identity with identifiers such as usernames or e-mail addresses.

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Users provide their identity with this

IE password.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAA

A

Authentication, Authorizations, and Accounting

Work together with identification to provide a comprehensive access management system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Grants users access to resources based on their proven identity.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tracks user activity and record it in logs.

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Allows security professionals to recreate the events that preceded and security incident.

A

Audit Trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An authentication factor that typically refers to a shared secret, such as a password or PIN. This is the least secure form of Authentication.

A

Something You Know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GPO

A

Group Policy Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enforce Password History

A

Remembers past passwords and prevents the user from using previously used passwords. IE if set to 24, prevents user from using previous 24 passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Maximum Password Age

A

Defines when users must change their password. IE if set to 45 days, their password will expire in 45 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Minimum Password Age

A

Defines how long users must wait before they change their password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Minimum Password LEngth

A

Enforces character length of password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Store Passwords using Reversible Encryption

A

Reversible encryption stores the password in such a way that the original password can be discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication factor that refers to something you can physically hold.

A

Something You Have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Credit-card sized cards that have an embedded microchip and a certificate.

A

Smart Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Embedded Certificate

A

Holds a users private key (only accessible by the users) and is matched with a public key (available to others).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PKI

A

Public Key Infrastructure

Supports issuing and managing certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Common Access Cards

A

Specialized type of smart card used by the DOD.

19
Q

Personal Identity Verification Card

A

PIV

Specialized type of smart card used by the US Federal Agencies.

20
Q

Token (or Key Fob)

A

An electronic device the size of a remote key for a car, including a LCD that displays a number, which changes periodically. This password is a rolling password, for one time use.

21
Q

HMAC

A

Hashing-based Message Authentication Code

Uses a hashing function and cryptographic key for many different cryptographic functions.

22
Q

HOTP

A

HMAC One-Time Password
An open standard used for creating one-time passwords, algorithm combines a secret key and an incrementing counter, and used HMAC to create a hash of the result. Then it converts the result into an HOTP value of 6-8 digits.

23
Q

TOTP

A

Time-based One-Time Password

Similar to HOTP, but uses a timestamp instead of a counter, they typically expire after 30 seconds.

24
Q

Authentication factor that uses biometrics for authentication.

A

Something You Are

25
Retina Scanner
Scans the retina of one or both eyes and uses pattern of blood vessels at the back of the eye for recognition.
26
Iris Scanner
Scan the retina of one or both eyes and uses pattern of blood vessels at the back of the eye for recognition.
27
Voice Recognition
Use speech recognition methods to identify different acoustic features.
28
False Acceptance
When a biometric system incorrectly identifies an unauthorized user as an authorized user.
29
FAR
False Acceptance Rate | Identifies the percentage of times false acceptance occurs.
30
False Rejection
When a biometric system incorrectly rejects an authorized user.
31
FRR
False Rejection Rate | Identifies the amount of times false rejections occur.
32
CER
Crossover Error Rate | The point where the FAR crosses over with the FRR.
33
Authentication factor that identifies a users location.
Somewhere You Are
34
Authentication factor that refers to actions that you can take such as gestures on a touch screen. IE tapping a head in a picture
Something You Do
35
Dual-Factor Authentication
Uses two different factors of authentication.
36
Multifactor Authentication
Uses two or more factors of authentication, which be by two different methods.
37
Kerberos
A network authentication mechanism used within Windows Active Directory domains and some Unix environments known as realms. It provides mutual authentication that can help prevent man-in-the-middle attacks and uses tickets to help prevent replay attacks.
38
Kerberos requires several requirements for it to work:
A method of issuing tickets used for authentication. Time synchronization. A database of subjects and users.
39
KDC
Key Distribution Center Packages user credentials with in a ticket and uses a complex process of issuing ticket-granting tickets (TGTs) and other tickets.
40
NLTM
New Technology LAN Manager
41
NLTM is a suite of protocols that provide what three things within Windows Systems?
Authentication, integrity, and confidentiality.
42
At their most basic, what do NLTMs use to challenge users and check their credentials?
A message Digest hashing algorithm.
43
What are the 3 versions of NLTMs and what are they?
NTLM - simple MD4 hash of a users password. NTLMv2 - a challenge -response authentication protocol. NTLM2 - same as v2 but adds a mutual authentication.
44
LDAP
Lightweight Directory Access Protocol Specifies formats and methods to query directories. It is an extension of the X.500