Chapter 4 Flashcards

(72 cards)

1
Q

Identification vs. Authentication

A

Identification is claiming, Authentication is proving you are someone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mutual Authentication

A

A client authenticates the server and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication factors

A

Something you are, know, have etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a pin and a password is SFA/MFA

A

Single factor, only something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

layered security is synonymous with

A

defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NAC

A

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NAC is part of

A

operational security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

operational security encompasses everything not related to

A

design and physical security of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security tokens are similar to

A

certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

security tokens contain

A

rights and access privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security tokens are created when

A

at login time, and destroyed when the session ends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a federation

A

a collection of networks that agree on some standard of operation, e.g. security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

federated identity

A

is a means of linking user’s identity to multiple business boundaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

transitive access

A

party A trusts B, B trusts C, therefore A trusts C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PAP

A

Authentication protocol (password authentication protocol) sends password and uid in plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SPAP

A

Shiva PAP - replaced PAP, encrypts credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CHAP

A

Challenge Handshake AP - client generates random number and is asked for it periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TOTP

A

time-based one-time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

HOTP

A

HMAC based one time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Account lockout threshold

A

how many attempts before lockout happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Reset account lockout counter after

A

counter reset to 0 after a certain amount of time has passed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PPP stands for

A

Point to Point protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Does PPP provide data security?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PPP encapsulates in

A

NCP - Network Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Authentication in PPP is handled in
LCP - link control protocol
26
PPP is unsuitable for
Wan connections
27
PPTP
Point to point tunneling protocol
28
PPTP does what?
Encapsulates and encrypts PPP packets
29
PPTP downside
it negotiates connection in the clear
30
what method was created by Cisco for dial up
Layer 2 Forwarding
31
Layer 2 forwarding is encrypted
false
32
Layer 2 forwarding works well over LANS
false
33
What method is a joint venture between Cisco and Microsoft
Layer 2 tunneling protocol
34
Layer 2 Tunneling is a hybrid of
PPTP and L2f
35
Layer 2 tunneling protocol is encrypted
false
36
Layer 2 tunneling protocol can provide data security
only through protocols like ipsec
37
Secure Shell uses encryption
true
38
IPsec is built in to
IPv6
39
RADIUS stands for
Remote Authentication Dial-in User Service
40
Radius protocol is a _______ standard
IETF
41
Radius allows a single server to perform authentications
true
42
TACACS stands for
Terminal Access Controller Access-Control System
43
Latest flavor of TACACS is
TACACS+
44
TACACS+ is widely implemented by
Cisco
45
TACACS+ allows for authentication from multiple methods T/F
True
46
SAML stands for
Security Assertion Markup Language
47
SAML is based on
XML
48
SAML is mainly used by
service providers
49
LDAP stands for
Lightweight Directory Access Protocol
50
Secure LDAP is called
LDAPS
51
LDAPS is encypted with
SSL/TLS
52
Kerberos uses a ______ to manage authentication
Key distribution center
53
KDC authenticates a _______
principal
54
A Kerberos principal is
a user, program or system
55
Kerberos issue what kinds of tickets
Ticket granting ticket and service ticket
56
Downside to kerberos
if kerberos server goes down
57
SSO stands for
Single Sign On
58
MAC
Mandatory Access Control
59
MAC access is defined how
all access is predefined
60
DAC
Discretionary Access Control
61
DAC handles access with more/less flexibility than MAC
more
62
RBAC
Role based Access Control or Rule based Access and Control
63
Rule Based Access Control
limits the user to setting in preconfigured policies (allow list or deny list)
64
Access control list can reject packets based on their types T/F
True
65
Firewall rules consist of
Block the connection Allow the connection Allow the connection only if it is secured
66
Switch ports (noun)
ports that only allow certain MAC address
67
802.1X is a _________ standard
IEEE
68
802.1X is a standard for what
port-based security for wireless network access control
69
Network Bridging
A device on the network has another NAC (wireless, 4G) that allows an attacker to jump networks
70
Trusted Operating System (TOS)
Meets the government's criteria
71
Common Criteria
most common standard for becoming a TOS
72
Common Criteria distinguishes OSs by
EAL, Evaluation Assurance Level (higher the better)