User-Authentication Methods Flashcards

1
Q

What authentication method uses a certificate authority and asymmetric cryptography to establish confidentiality and integrity without knowing anything about the other party prior to the conversation?

A

PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the 5 step Kerberos user-authentication method

A

1) REQUEST for TICKET granting ticket (TGT)
2) TGT RETURNED by authentication service
3) REQUEST for APPLICATION ticket (authenticated with TGT)
4) Application ticket returned
5) User then can Request for service with authenticated application ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the name given to the conceptual model for managing network security through one central location?

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what authentication server allows for domain-level authentication on both wired and wireless networks?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two differences between RADIUS and TACACS+?

A

1) RADIUS combines authentication and authorization into one profile but TACACS separates the two
2) TACACS uses TCP whereas RADIUS uses UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following only encrypt the served page data and the submitted data like POST fields? HTTPS or S-HTTP?

A

S-HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two goals of Network Admission Control do?

A

1) Authenticates
2) ensures systems are safe and secure before they’re allowed to access the network (by checking for malware, os version etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name a common example of Network Access Control used in wireless networks? (is also used in wired but less so)

A

802.1x (port-access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which client authentication method involves the requesting client using a nonce and an ID value and sequencing them with the shared text-phrase secret to generate a one-way hash value using the MD5 encryption algorithm?

A

CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what framework provides a standardised way of authenticating onto a LAN?

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What cryptographic process provides data integrity and origin authentication?

A

Hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which cryptographic algorithm is published by NIST?

A

SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name two implementations of Network Access Control

A

1) Cisco’s Network Admission Control

2) Microsoft’s Network Policy and Access Services (NPAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Network Access Control, Posture Assessment examines the devices when they connect to the network. What 3 items are commonly checked?

A

1) Anti-malware updates
2) Operating system updates
3) Windows reg settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a guest network used for?

A

It is where a device is held during Posture Assessment during Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In Network Access Control, what can help support the assessment of endpoints (devices) not owned by the organization and help make BYOD policy possible?

A

Nonpersistent agents

17
Q

List two reasons why Access Control applied at the resource can be better than controlling access at the Edge/firewall?

A

1) controls are more granular and more easily controlled by the owner
2) A mistake made on the ACL can cause widespread access issues

18
Q

What network access security method uses EAP and typically authenticates devices with a RADIUS server?

A

802.1x

19
Q

In NAC, a persistent agent is one that…

A

is installed on a NAC client and starts when the OS loads.

It provides system wide notifications and alerts

20
Q

In NAC, a nonpersistent or dissolvable agent is one that…

A

is used to access the device only during log-in, usually through a web portal. It is removed when authentication has taken place.

21
Q

What is the key difference between MS-CHAP and MS-CHAPv2?

A

v2 can do mutual authentication of both client and server

22
Q

What authentication method is used to overcome the limitations of RADIUS? How?

A

Diameter

It can encrypt the authentication process using EAP

23
Q

What is one of the limitations of RADIUS authentication?

A

It only encrypts the password, but not the entire authentication conversation.

24
Q

Which authentication method developed by Cisco allows for interaction with Kerberos?

A

TACACS+ (Terminal Access Controller, Access-Control System)