Sec + Finals Flashcards
(165 cards)
What is a decentralized open source FIM that does not require specific software to be installed on the desktop?
OpenID
What is using one authentication credential to access multiple accounts or applications
Single Sign On (SSO)
What is using a single authentic credential that is shared across multiple networks
Identity Management
What is Federal Identity Management (FIM)?
When multiple networks are owned by different organizations
Which Single Sign On (SSO) relies on tokens?
OAuth
What is the name given to a wireless technology that uses short range radio frequency transmissions and provides for rapid ad hoc device pairings?
Bluetooth
What is Personal Area Network (PAN)?
Technology designed for data communications over short distances
What are the two types of Bluetooth network topologies?
Piconet and Scatternet
Which Bluetooth topology is it when two Bluetooth devices come within range of each other, they automatically connect with one another?
Piconet
A group of piconets in which connections exists between different piconets is called a?
Scatternet
What are the two Bluetooth attacks?
Bluejacking and bluesnarfing
Which Bluetooth attack is it that sends unsolicited messages to Bluetooth enabled devices but is considered more annoying than normal because no data is stolen?
Bluejacking
Which Bluetooth attack is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers?
Bluesnarfing
What are the most common type of Authentication Services?
RADIUS (does not encrypt)
Kerberos (tickets)
TACACS (Unix)
LDAP (big phone book)
Which Authentication service is suitable for what are called “high volume service control expectations” such as dial-in access to a corporate network?
Remote Authentication Dial In User Service (RADIUS)
Which authentication service client is typically a device such as a wireless access point (ap) or dial-up server that is responsible for sending user credentials and connections in the form of a RADIUS message to a RADIUS server?
RADIUS
Which authentication system utilizes a ticket?
Kerberos
Which authentication device is commonly used on Unix devices?
Terminal Access Control Access Control System (TACACS)
Which authentication service is referred to the big phone book since it works as a directory service and sometimes called X.500?
Lightweight Directory Access Protocol (LDAP)
What is the attack that can occur when user input is not properly filtered?
LDAP injection attacks
What is the defense against LDAP injection attacks?
Examine all user input before processing
What are the two categories of symmetric algorithms?
Stream Cipher
Block Cipher
What is stream cipher?
Takes one character and replaces it with another character
What is block cipher?
Manipulates an entire block of plaintext at one time