CompTIA Security + Ch 8
Card Set Information
CompTIA Security + Ch 8
Something that identifies a person such as a ID card.
When a person's identity is confirmed, to allow access to a computer or file(s).
When a user is granted access to resources after authentication is complete.
An initial validation of an identity.
Physical devices given to authorized users to help with aunthentifacation. Either part of a ID card or can be attached to a keychain.
Two or more types of authentifacation for user access.
Authenticating a user by way of physical characteristics, like fingerprint or retinal scan.
An area between to doorways, meant to hold people until they are identified and authenticated.
Authentication used to connect devices to a LAN or WLAN. It's an example of port-based NAC.
Extensible Authentication Protocol (EAP)
Not an authentication mechanism but instead defines message formats.
Single-Sign On (SSO)
When a user can log in once and gain access to multiple systems without beign asked to log in again.
When a system authenticates a user that should not have access to the system.
When the system denies a user that is authorized to access the system.
When a biometric system fails to recognize an authorized person and doesn't allow that person access.
Lightweight Directory Access Protocol (LDAP)
An Application Layer protocol used for accessing and modifying directory services data.
Authentication protocol used that enables computers to prove their identity to each other in a secure manner.
When two computers, for example a server and a client, both verify each others identity.
Part of the authentication proccess used by Kerberos.
Challenge-Handshake Authentication Protocol (CHAP)
An authentication scheme used by Point-to-Point Protocol (PPP) that is the standard for dial-uo connections.
Remote Access Service (RAS)
A networking service that allows incoming connections from remote dial-in clients. It is used with VPNs.
Virtual Private Network (VPN)
A connection between two or more computers or devices that are not on the same private network.
Point-to-Point Tunneling Protocol (PPTP)
A tunneling protocol used to support VPNs. A VPN device or server must have inbound port 1723 open to enable incoming PPTP connections.
Layer 2 Tunneling Protocol (L2TP)
A tunneling protocol used to connect virtual private networks. It doesn't include confidentiality or encryption on it's own. It uses port 1701.
A hardware appliance that allows hundreds of users to connect to the network from remote locations via a VPN.
Remote Authentication Dial-in User Service (RADIUS)
Used to provide centralized administration of dial-up, VPN, and wireless authentication.
Terminal Access Controller Access-Control System (TACACS)
A remote authentication protocol similar to RADIUS, used more often in UNIX networks.