Part 2 Chapter 5s

Card Set Information

Part 2 Chapter 5s
2015-02-20 17:58:09
Part Chapter 5s
Part 2 Chapter 5s
Part 2 Chapter 5s
Show Answers:

  1. Verifies that users are who they say they are?
  2. means that data are only accessible by trusted users.
  3. Is the assurance that data remain intact and unmodified in transit, storage, or use.
  4. Assures that data are available when needed.
  5. verifies what an authenticated user has the rights and permissions to do?
  6. What areĀ 5 standard Authentication systems?
    • -Radius
    • -Kerberos
    • -LDAP
    • -1EEE 802.1x
  7. What are the seven authentication methods?
    • -password authentication
    • -public-key authentication
    • -zero-knowledge proofs
    • -digital signatures
    • -SSL
    • -IPSec
    • -Secure shell
  8. SSL
    Secure sockets layer
  9. is a protocol that allows clients and servers to authenticate each other. After establishing a connection with a server, a client sends a hello message to the server that it wants to communicate with. The server responds with a hello message that also instructs the client on the protocol in use, the encryption method, a session identifier, and the compression method in use, if any. The sever then provides its digital signature (certificate) and requests one from the client.
    SSL (Secure Sockets Layer)
  10. Invokes the Authentication Header (AH) protocol that provides both communication integrity and authentication of the source of an IP datagram.
  11. is a secure remote login protocol that performs host authentication on the Transport layer
    SSH (Secure Shell)
  12. SSH
    Secure Shell
  13. IPSec
    IP Security
  14. SFA
    Single-Factor authentication
  15. TFA
    Two-factor authentication
  16. MFA
    multi-factor authentication
  17. uses a single knowledge factor for authentication
    single-factor authentication (SFA)
  18. requires two pieces of identification for authentication
    TFA (Two-factor authentication)
  19. requires at least one of each level of authentication factors.
    MFA (multi-factor authentication)
  20. What is the difference between Authentication and Identification?
    Authentication proves you hold the proper credentials, while identification validates that the person entering the information is in fact the owner of the credentials.
  21. is a category of devices and methods that uniquely identify people based on one or more of their physiological or behavioral characteristics. Physiological traits relate to the contours of a person's body. Behavioral characteristics measure unique performances of a person.
  22. are portable devices that identify a person.
    Security Token
  23. has an embedded microprocessor system. Can be either contract or noncontact.
    Smart Card
  24. is a U.S. Department of Defense dual-purpose card.
    Common Access Card or Personal Identification Verification Card.