NIS Chapter 04 Flashcards

(33 cards)

1
Q

Define authentication

A

the verification of the identity of a user using their credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

define authorisation

A

he granting of access to resources based on successful authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

define accounting

A

keeping track of the use of resources by a user on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

give 3 examples of authentication credentials

A

password and username, biometrics, RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the 3 categories of credentials?

A
  • something you know, you have, you are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a RADIUS server

A

it is a remote authentication dial in user server that is a protocol that provides AAA capabilities. A single authorisation entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 examples of accounting records that RADIUS servers contain?

A
  • usernames, Input packets, outpackets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is 802..1X

A

it is a standard that deals with access control in a network. It provides an authorisation framework to either allow or disallow traffic to pass through a port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What authentication protocol is used in layer 2?

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 major components of the 802.1X framework

A
  • Supplicant
  • authenticator
    -authentication server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the supplicant in a the 802.1X standard

A
  • this is a device that needs to be validated by the authentication server based on it credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocol do the supplicant and the authentication server use a communication medium? And at which layer does this communication take place?`

A

the Extensible Authentication Protocol. Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an authenticator in the 802.1X standard?

A

the intermediatory between the supplicant and the authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 ports maintained by the authenticator and what are they for?

A

There is a controlled port that is used to only allow traffic after authentication.

the uncontrolled traffic allows only EAP traffic to pass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A supplicant can be a device or software, what can the authenticator be in a real world example?

A

An access point or a WLAN controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is an authentication server?

A

a component that validates the credentials of a supplicant

17
Q

What is LDAP?

A

Lightweight Directory ACcess Protocol that can be used as an application for querying and modifying services in the place of an authentication server.

18
Q

Why would an organisation choose to have no RADIUS server or LDAP?

A

SO that queries can go from the authenticator to the LDAP instead of going through a RADIUS. This is to increase performance

19
Q

What is a NAC?

A

Network access control which is a server that allows for access decision to be made based on a devices antivirus state and OS patch version.

20
Q

What happens if the NAC is not satisfied with a device’s state?

A

Create a VLAN that isolates them till the necessary changed are implemented

21
Q

What are the distinguishing features of authentication servers?

A
  • Client server model
  • Network security (encryption)
  • Flexible Authentication Mechanism (various auth methods)
  • EAP (new attributes)
22
Q

What is mutual authentication?

A

This is a type of authentication that validates both the supplicant and the authentication server, This prevents man in the middle attacks

23
Q

How does mutual authentication happen?

A

The EAP protocol allows the supplicant to validate the AS using server side certificates

24
Q

What is the purpose of the AS certificates?

A
  • validates the AS before supplicant sends its credentials
  • Creates an encrypted TLS tunnel to supply supplicant credentials after authentication
25
What is a TSL?
A protocol that is used to secure communication in the Transport layer. Used by supplicant to provide credentials
26
What is a shared secret?
A way for the AS and the authenticator to validate one another
27
describe the generic EAP exchange
page 40
28
What are some security risks associated with EAP?
- credentials sent in clear text - weak hash
29
What are the issues associated with EAP-MD5
- one way authentication - credentials sent in clear text - weak hash
30
Weaknesses with the EAP-LEAP
- credentials sent in clear text
31
Most widely used EAP and why
EAP-PEAP,
32
Strong EAP protocols
= EAP MSCHAP - EAP-TLS - EAP-GTC
33
What is EAPOL?
-