Flashcards in Chapter 4 - Access Control, Authentication and Authorization Deck (25):
What is the mechanism of verifying that identification?
Authentication systems or methods are based on one or more of which 5 factors
Something you know, such as a password or PIN
Something you have, such as a smart card, token or ID device
Something you are, such as your fingerprints or retinal pattern (often called biometrics)
Something you do, such as an action you must take to complete authentication
Somewhere you are (this is based on geolocation)
Whenever two or more parties authenticate each other, it is know as _______?
When two or more access methods are included as part of the authenticate process is known as _______?
A system that uses smart cards and passwords is referred to as a _________________?
What are similar to certificates in that they are used to identify and authenticate the user, contain the rights and access privileges to the bearer, and at the completion of a session is destroyed?
What is collection of computer networks that agree on standards of operation such as security standards?
What the 5 Authentication Protocols?
PAP (Password Authentication Protocol)
SPAP (Shiva Password Authentication Protocol)
CHAP (Challenge Handshake Authentication Protocol)
TOTP (Time-Base One-Time Password)
HOTP (HMAC-Based One-Time Password)
What must you do to configure the router securely?
Change the default password
Walk through the advanced settings
Keep the firmware upgraded
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) requires product developers to use good design practices?
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) requires conscientious development moderate levels of security?
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) is primarily used when the user wants assurance that the system will operate correctly but threats to security aren't viewed as serious?
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) requires positive security engineering based on good commercial development practices?
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) is intended to ensure that security engineering has been implemented in a product from the early design phases.
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) provides high level of assurance of specialized security engineering?
In the Trusted OS which of the 7 Evaluation Assurance Levels (EAL) is intended for extreme high levels of security?
What is Network Bridging?
Occurs when a device has more than one network adapter card installed and the opportunity presents itself for a user on one of the networks to which the device is attached to jump to the other.
What are the Firewall Rules?
Block the connection
Allow the connection
Allow the connection only if it is secured
Who issued the CAC?
The DoD (Department of Defense), issued the CAC (Common Access Card) as a general identification / authorization card for military personnel, contractors and non-DoD employee.
What are the 4 Access Control methods?
* Mandatory Access Control (MAC)
* Discretionary Access Control (DAC)
* Role-Based Access Control (RBAC)
* Rule-Based Access Control (RBAC)
What is a variation of Mandatory Access Control and it isn't addresses separately on the Security+ exam?
LBAC (Lattice-Based Control)
What is SSO?
Single Sign On
The purpose is to give users access to all the applications and systems they need when they logon
What type of authentication does Kerberos use?
Key Distribution Center (KDC)
KDC authenticates the principle (which can be a user, program or system) and provides it with a ticket.
What type of ticket is the user given when using Kerberos and authenticates with KDC?
Ticket Granting Ticket (TGT)
This ticket is encrypted and has a time limit of up to 10 hours. The ticket lists the privileges of that user (much like a token)