The authentication server is to authentication as the ticket granting service is to _______.

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (33)

Authn is short for ________.
Authoritarian
Authored
Authentication
Authorization

Authentication

Which of the following are valid multi-factor authentication factors? Check all that apply.
Something you know
Something you did
Something you have
Something you are

Something you know
Something you have
Something you are

Security Keys utilize a secure challenge-and-response authentication system, which is based on ________.
Shared secrets
Public key cryptography
Steganography
Symmetric encryption

Public key cryptography

The authentication server is to authentication as the ticket granting service is to _______.
Integrity
Identification
Verification
Authorization

Authorization

Your bank set up multifactor authentication to access your account online. You know your password. What other factor combined with your password qualifies for multifactor authentication? Check all that apply.
Passphrase
PIN
Fingerprint
Bank card

Bank card
Fingerprint

A Lightweight Directory Access Protocol (LDAP) uses a _____ structure to hold directory objects.
Organizational Unit
Distinguished Name
Data Information Tree
Bind

Data Information Tree

A systems administrator is designing a directory architecture to support Linux servers using Lightweight Directory Access Protocol (LDAP). The directory needs to be able to make changes to directory objects securely. Which of these common operations supports these requirements?
Search, modify.
StartTLS, delete.
Bind, modify.
Bind, add.

StartTLS, delete.

What are the benefits of using a Single Sign-On (SSO) authentication service? Check all that apply.
Reduce overhead of password assistance
Reduce likelihood of passwords being written down
One set of credentials for the user
Reduce time spent on re-authenticating to services

Reduce overhead of password assistance
Reduce likelihood of passwords being written down
One set of credentials for the user
Reduce time spent on re-authenticating to services

In the three As of security, which part pertains to describing what the user account does or doesn't have access to?
Accounting
Authorization
Authentication
Accessibility

Authorization

A(n) _____ defines permissions or authorizations for objects.
Network Access Server
Access Control Entries
Extensible Authentication Protocol
Access Control List

Access Control List

What does a Terminal Access Controller Access Control System Plus (TACACS+) keep track of? Check all that apply.
Track user authentication
Commands that were ran
Systems users authenticated to
Bandwidth and resource usage

Track user authentication
Commands that were ran
Systems users authenticated to

Authentication is concerned with determining _______.
Validity
Access
Eligibility
Identity

Identity

The two types of one-time-password tokens are ______ and ______. Check all that apply.
Time-based
Identity-based
Counter-based
Password-based

Time-based
Counter-based

In the three As of security, what is the process of proving who you claim to be?
Authorization
Authored
Accounting
Authentication

Authentication

A network admin wants to use a Remote Authentication Dial-In User Service (RADIUS) protocol to allow 5 user accounts to connect company laptops to an access point in the office. These are generic users and will not be updated often. Which of these internal sources would be appropriate to store these accounts in?
Active Directory (not this)
LDAP (not this)
SQL database
Flat file

...

Kerberos enforces strict _____ requirements, otherwise authentication will fail.
Time
NTP
Strong password
AES

Time

Which of these are examples of an access control system? Check all that apply.
TACACS+
OAuth
OpenID
RADIUS

TACACS+
OAuth
RADIUS

A company is utilizing Google Business applications for the marketing department. These applications should be able to temporarily access a user's email account to send links for review. Why should the company use Open Authorization (OAuth) in this situation?
Compatibility with third party apps
Gain access through a wireless access point
Utilize a Key Distribution Center server
Administer multiple network devices

Compatibility with third party apps

An organization needs to setup a(n) _____ infrastructure to issue and sign client certificates.
CRL
LDAP
ID
CA

CA

What is used to request access to services in the Kerberos process?
Client ID
Client-to-Server ticket
TGS session key
Ticket Granting Ticket

Ticket Granting Ticket

Which of these are examples of a Single Sign-On (SSO) service? Check all that apply.
Relying Parties
Tokens
Kerberos
OpenID

Kerberos
OpenID

A network admin deployed a Terminal Access Controller Access Control System Plus (TACACS+) system so other admins can properly manage multiple switches and routers on the local area network (LAN). The system will keep track and log admin access to each device and the changes made. This "logging" satisfies which part of the three As of security?
Authentication
Administration
Accounting
Authorization

Accounting

Authz is short for ________.
Authoritarian
Authentication
Authored
Authorization

Authorization

Authorization is concerned with determining ______ to resources.
Identity
Validity
Eligibility
Access

Access

Security Keys are more ideal than OTP generators because they're resistant to _______ attacks.
DDoS
Password
Phishing
Brute force

Phishing

Multiple client switches and routers have been set up at a small military base. The network team decided to implement Terminal Access Controller Access-Control System Plus (TACACS+), along with Kerberos, and an external Lightweight Directory Access Protocol (LDAP) service. What is the primary reason TACACS+ was chosen for this?
Device administration
NIPRNet
Single Sign-On
Network access

Device administration

In addition to the client being authenticated by the server, certificate authentication also provides ______.
Authorization
Integrity
Server authentication
Malware protection

Server authentication

In a Certificate Authority (CA) infrastructure, why is a client certificate used?
To authenticate the client
To authenticate the server
To authenticate the subordinate CA
To authenticate the CA (not this)

...

An Open Authorization (OAuth) access token would have a _____ that tells what the third party app has access to.
request (not this)
e-mail
scope
template

...

Which of these passwords is the strongest for authenticating to a system?
P@55w0rd!
P@ssword!
Password!
P@w04d!$$L0N6

P@w04d!$$L0N6

Access control entries can be created for what types of file system objects? Check all that apply.
APIs
Folders
Files
Programs

Folders
Files
Programs

Kerberos uses _____ as authentication tokens.

tickets

Which of these are examples of "something you have" for multifactor authentication? Check all that apply.

RSA / Ping / OTP

Sets with similar terms

Chapter 5 Vocab - ISEC

46 terms

madison_cook64

ISEC Chapter 5 Vocabulary

45 terms

jglove42

Chapter 11

27 terms

asoto0890

SY0-401:5 TS Quiz Access Control and Identity Mana…

54 terms

Berevan_Omer

Sets found in the same folder

IT Security: Defense against the digital dark arts…

27 terms

snramos10

Week 1 - Understanding Security Threats

40 terms

heathersisson

IT Security: Defense against the digital dark arts…

20 terms

snramos10

WEEK 5:: SYSTEM HARDENING

10 terms

dojikerze

Other sets by this creator

Week 6 - Creating a Company Culture for Security

28 terms

heathersisson

Week 5 - Defense in Depth

24 terms

heathersisson

Data Recovery & Backups

31 terms

heathersisson

US History 1

90 terms

heathersisson

Other Quizlet sets

Ch 12 - AIS

27 terms

Auntdede22

Post-Assessment Exam

75 terms

ouyangmao6

Mod 6, day 5

96 terms

toxicblyssPLUS

Sec + terms unknown

34 terms

wt34038

Related questions

QUESTION

If a hacker can take over an application, then he or she receives how much permission that the operating system gave to the application.

2 answers

QUESTION

The -O switch in the Nmap commands you ran in this lab (for example, nmap -O -v 10.20.100.50) instructed Nmap to:

10 answers

QUESTION

In the TCP/IP stack, what layer is concerned with physically moving bits across the network's medium?

15 answers

QUESTION

How does a standard hub differ from a standard switch?

15 answers

What is used to request access to services in the Kerberos?

To request access to a specific service, the client must first have obtained a credential for the ticket-granting service from the authentication server, and a server credential from the ticket-granting service. See Obtaining a Credential for the Ticket-Granting Service and Obtaining a Credential for a Server.

Which of these are example of something you have for multifactor authentication?

A multi-factor authentication example of something the user has could include:.
Google Authenticator (an app on your phone)..
SMS text message with a code..
Soft token (also called software token)..
Hard token (also called hardware token)..
Security badge..

What does a Kerberos authentication server issue to a client that successfully authenticates?

What does a Kerberos authentication server issue to a client that successfully authenticates? ticket-granting ticket; Once authenticated, a Kerberos client receives a ticket-granting ticket from the authentication server.

What does Tacacs keep track of?

The TACACS+ protocol provides detailed accounting information and flexible administrative control over the authentication, authorization, and accounting process.