Shared Flashcard Set

Details

10b. Authentication, Authorization, and Accounting (AAA)
CompTIA Network+ Authentication, Authorization, and Accounting (AAA)
34
Computer Networking
Professional
04/04/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
___ refers to the mechanisms used to verify the identity of the computer or user attempting to access a particular resource.
Definition
Authentication
Term
___ is usually done with a set of credentials — most commonly a username and password.
Definition
Authentication
Term
___ determines if the authenticated user is allowed access to a particular resource.
Definition
Authorization
Term
___ refers to the tracking mechanisms used to keep a record of events on a system.
Definition
Accounting
Term
___ is a standard for providing authentication with only a single sign-on.
Definition
Kerberos
Term
A nonproprietary protocol used for cross-platform authentication, ___ is the main authentication protocol used with Windows servers.
Definition
Kerberos
Term
___ enables secure authentication over an insecure network such as the Internet.
Definition
Kerberos
Term
Kerberos uses ___ ___ cryptography, in which both client and server use the same encryption key to cipher and decipher data.
Definition
symmetric key
Term
In ___ ___ cryptography (aka public key cryptography), a device has both a public and private key. The public key is used to encrypt the communication, and the private key is used for decrypting. The private key is never shared.
Definition
asymmetric key
Term
Kerberos authentication works by assigning a unique key called a ___ to each client that successfully authenticates to a server.
Definition
ticket
Term
A ___ ___ ___ is a collection of software, standards, and policies combined to enable users from the Internet or other unsecured public networks to securely exchange data.
Definition
Public Key Infrastructure (PKI)
Term
___ ___ ___ uses a public and private cryptographic key pair obtained and shared through a trusted authority.
Definition
Public Key Infrastructure (PKI)
Term
A ___ is a digitally signed statement that associates the credentials of a public key to the identity of the person, device, or service that holds the corresponding private key.
Definition
certificate
Term
___ ___ issue and manage certificates.
Definition
Certificate authorities (CAs)
Term
A ___ ___ ___ is a list of certificates that were revoked before they reached the certificate expiration date.
Definition
Certificate Revocation List (CRL)
Term
When keys are used to secure data transmissions, the computer generates two different types of keys: ___ and ___.
Definition
public
private
Term
___ (asymmetric) key encryption uses both a private and public key to encrypt and decrypt messages. The public key is used to encrypt a message or verify a signature, and the private key is used to decrypt the message or to sign a document.
Definition
Public
Term
___ (symmetric) key encryption uses a single key for both encryption and decryption.
Definition
Private
Term
___s are the cornerstones of the Public Key Infrastructure (PKI).
Definition
Certificates
Term
___ is a protocol that enables a single server to become responsible for all remote-access authentication, authorization, and auditing (or accounting) services.
Definition
RADIUS
Term
__ __ __ __ __ __ __ is a security protocol for centralized validation of access to a router or Network Access Server (NAS).
Definition
Terminal Access Controller Access Control System+ (TACACS+)
Term
TACACS+ uses ___ for data delivery while RADIUS uses ___.
Definition
TCP
UDP
Term
RADIUS combines ___ and ___, whereas
TACACS+ can separate their functions.
Definition
authentication
authorization
Term
__ ___ __ __ protocol authenticates remote Windows workstations, providing the functionality to which LAN-based users are accustomed while integrating the hashing algorithms used on Windows networks.
Definition
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
Term
___ uses a challenge/response mechanism to keep the password from being sent during the authentication process.
Definition
MS-CHAP
Term
MS-CHAP uses the Message Digest 5 (MD5) hashing algorithm and the Data Encryption Standard (DES) encryption algorithm to generate the ___ and ___.
Definition
challenge
response
Term
MS-CHAP provides mechanisms for reporting ___ errors and for changing the user's ___.
Definition
connection
password
Term
A more secure authentication method than MS-CHAP, ___ adds support for two-way authentication and improves cryptographic key analysis.
Definition
MS-CHAP v2
Term
___ ___ Protocol is an extension of PPP that supports more sophisticated authentication than simple username and password (token cards, smart cards, and digital certificates).
Definition
Extensible Authentication Protocol (EAP)
Term
__ __ __ Protocol enables authentication without actually having the user send his password over the network.
Definition
Challenge Handshake Authentication Protocol (CHAP)
Term
___ ___ Protocol is a simple authentication protocol in which the username and password are sent to the remote-access server in clear text, making it possible to steal both.
Definition
Password Authentication Protocol (PAP)
Term
With ___ access, users are allowed to log on without authentication.
Definition
unauthenticated
Term
When two or more access methods are included as part of the authentication process, it is called a ___ authentication system.
Definition
multifactor
Term
An authentication system that uses two items such as smart cards and passwords is called a ___-___ system.
Definition
two-factor
Supporting users have an ad free experience!