Chapter 9 Flashcards

1
Q

identity proofing

A

An initial validation of an identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

closed-circuit television (CCTV)

A

A video system (often used for surveillance) that
makes use of traditional coaxial-based video components, but is used privately, within a
building or campus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

security tokens

A

Physical devices given to authorized users to help with authentication.
These devices might be attached to a keychain or are part of a card system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

federated identity management (FIM)

A

When a user’s identity is shared across multiple
identity management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

false negative

A

When a system denies a user who actually should be allowed access to
the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

false positive

A

When a system authenticates a user who should not be allowed access to
the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

802.1X

A

An authentication technology used to connect devices to a LAN or
WLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Extensible Authentication Protocol (EAP)

A

Not an authentication mechanism in itself
but instead defi nes message formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protected Extensible Authentication Protocol (PEAP)

A

Protocol used to encapsulate
EAP packets within encrypted and authenticated tunnels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Lightweight Directory Access Protocol (LDAP)

A

An Application Layer protocol used for
accessing and modifying directory services data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Kerberos

A

An authentication protocol that enables computers to prove their identity to
each other in a secure manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

tickets

A

used by Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Challenge Handshake Authentication Protocol (CHAP)

A

An authentication scheme used
by the Point-to-Point Protocol (PPP) that is the standard for dial-up connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Point-to-Point Tunneling Protocol (PPTP)

A

A tunneling protocol used to support VPNs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Layer 2 Tunneling Protocol (L2TP)

A

A tunneling protocol used to connect virtual private
networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote Authentication Dial-In User Service (RADIUS)

A

Used to provide centralized
administration of dial-up, VPN, and wireless authentication.

17
Q

Terminal Access Controller Access-Control System Plus (TACACS+)

A

A remote authentication
protocol similar to RADIUS used in Cisco networks.