Domain 5 Test Notes Flashcards

(30 cards)

1
Q

is a network authentication protocol that uses secret-key cryptography to
authenticate service requests between two parties, typically a client and a server on primese. Commonly used in Windows environments.
Information is exchanged via ticket,s which identify if a user is authentic and if they should be granted access to specific resources.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The central authority that issues tickets and manages
cryptographic keys in a Kerberos realm.

A

Key Distribution Center (KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Part of the KDC that verifies user credentials and grants a
ticket-granting ticket (TGT). The TGT proves that a subject has been authenticated through a KDC

A

Authentication Service (AS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Part of the KDC that validates the use of a ticket for a
specified purpose, such as network service access. When the client wants to access a
specific service, it contacts the TGS using the TGT.

A

Ticket Granting Service (TGS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides proof that a subject has authenticated through a KDC and is authorized to request tickets to access other objects. It is encrypted and includes symmetric key, an expiration time, and the user’s IP address. Subject present this when requesting tickets to access objects

A

Ticket-Granting Ticket (TGT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An encrypted message that provides proof that a subject is authorized to access an object. Once it expires, a client must request a renewal or a new one to continue communication with any server

A

Ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can be any entity that can request a ticket (user, machine, service)

A

Principal (Kerberos)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

logical area such as domain or network ruled by Kerberos

A

Realm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. User types a username and password into the client
  2. The client generates a request with these credentials to the KDC which is encrypted
  3. KDC verifies the username against its database of known credentials.
  4. KDC generates a session key that will be used by the client & kerberos server. Encrypt with a hash of user’s password. KDC generates a encrypted timestamped TGT.
  5. KDC transmits the encrypted session key and encrypted timestamped TGT to client
  6. Client installs the TGT for use until it expires. Client decrypts the session key using a hash of the user’s password.
A

Kerberos Login Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Called the successor to KERBEROS, it addresses some of the issues of Kerberos.
It uses PKI encryption (asymmetric). It uses Privilege Attribute Server (PAS) which issues Privilege Attribute Certificates (PAC).

A

Secure European System for Application in Multi-vendor Environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Centralized authentication for remote access connection. It provides authentication, authorization, and accounting for users access a network service. It’s commonly used in wireless networks, VPNs, and dial-up connections.

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Centralized remote authentication service that provides authentication, authorization, and accounting. Intended to be a replacement for RADIUS because it provides reliability (uses SCTP or TCP). Used in prepaid and credit-based usage models in mobile device services.

A

Diameter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Centralized remote authentication service similar to RADIUS but considered more secure, because it encrypts the entire data package not just the password. It uses two factor authentication. It’s commonly used in wireless networks, VPNs, and dial-up connections

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A simple password-based authentication
protocol that provides basic authentication. It transmits
passwords in clear text, making it insecure.

A

Password Authentication Protocol (PAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Performs authentication using challenge response dialogue that can’t be replayed. It uses a challenge-response mechanism to avoid sending passwords
in clear text.

A

Challenge Handshake Authentication Protocol (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One domain allows access to users on another domain, but the other domain does not all access to users on the first domain

A

One Way Trust

17
Q

Two domains allow access to users on both domain.

A

Two way Trust

18
Q

A trust that can extend beyond two domains to other trusted domains in the forest.

A

Transitive Trust

19
Q

A one way trust that does not extend beyond two domains

A

Intransitive (non transitive) Trust

20
Q

occurs when an authentication system authenticates someone incorrectly. Also know as a false positive authentication. Sometimes called Type II error

A

False Acceptance Rate (FAR)

21
Q

occurs when an authentication system does not authenticate a valid user. Sometimes called a false negative authentication or Type I error

A

False Rejection Rate (FRR)

22
Q

identifies the accuracy of a biometric method. It shows where the false rejection rate is equal to the false acceptance rate

A

Crossover error rate (CER)

23
Q

Is an open XML based standard commonly used to exchange authentication and authorization(AA) information between federated organizations. It provides SSO capabilities for browser access

A

Security Assertion Markup Language (SAML)

24
Q

Is an open protocol to allow secure authorization in a simple and standard method from web, mobile, and desktop application. Exmaple: Signing in to a website using your Google account.

A

Open Authorization (OAuth)

25
is an authentication layer built on top of OAuth 2.0. It provides a standardized way to verify user identity and obtain basic user profile information.
Open ID
26
A random value that is added to the end of a password before the operating system hashes the password. Helps against dictionary and rainbow table attacks
Salt
27
Pre-made list of plaintexts and matching ciphertext. Commonly used for cracking passwords
Rainbow Table
28
systems enable secure storage, management, and retrieval of authentication credentials for automated logon. Examples:KeePass, LastPass
Credential Management
29
allows for seamless authentication across different domains or organizations, allowing the user to use the same credential across multiple resources in multiple domains. This improves user experience and security, while also reducing the administrative effort related to identity management.
Federated Identity Management
30
allows for seamless authentication across a single domain
Single Sign On