1.2 AAA Framework and Authorization Flashcards

(26 cards)

1
Q

What are the three core components of the AAA framework?

A

Authentication, Authorization, Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Authentication address in the AAA framework?

A

Verifies the user’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Authorization determine in the AAA framework?

A

What resources the user can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Accounting log in the AAA framework?

A

All security-related events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of ‘identification’ in the login process?

A

User claims a specific identity, usually by providing a username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a VPN concentrator handle user authentication when it doesn’t store credentials locally?

A

Sends username and password to a central AAA server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is it impractical to store passwords directly on devices in the field?

A

Security risks if the device is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Certificate Authority (CA)?

A

A device or software responsible for managing certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary function of a Certificate Authority?

A

Create and digitally sign certificates for devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a device certificate help verify a company-owned laptop?

A

Confirms authenticity through a unique certificate signed by a trusted CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the main problem with a ‘no authorization model’ approach?

A

Complex and time-consuming manual configuration of user rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define ‘abstraction’ in the context of authorization models.

A

Separating users from specific data and applications for streamlined administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does using groups in an authorization model solve scalability issues?

A

Users inherit permissions by being added to groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give an example of information logged by the Accounting component of the AAA framework.

A

Time logged in, data sent or received, time logged out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the AAA Framework?

A

Authentication, Authorization, and Accounting for managing access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the term ‘Accounting’ refer to?

A

Tracking and logging security-related events and user activities

17
Q

What is the concept of ‘abstraction’ in authorization?

A

Separating users from specific data and applications

18
Q

What is an AAA Server?

A

A central server that stores user credentials and processes requests

19
Q

What is the process of Authentication?

A

Verifying the claimed identity of a user or device

20
Q

What does Authorization determine?

A

Specific resources that an authenticated user can access

21
Q

What is a Certificate Authority’s role in device authentication?

A

Issuing, signing, and managing digital certificates

22
Q

What is a device certificate?

A

A digital document uniquely identifying a device

23
Q

What is the initial step in the login process?

A

Identification

24
Q

What are ‘Rights and Permissions’?

A

Privileges granted to a user or group for actions and resources

25
What is a Root CA?
The top-level Certificate Authority in a PKI
26
What is a VPN Concentrator?
A device providing secure remote access through encrypted tunnels