Term
What type of attack involves an attacker stealing a file containing password digests and comparing the stolen digests to digests created by the attacker?
|
|
Definition
|
|
Term
A RADIUS authentication server requires that the ________ be authenticated first.
|
|
Definition
|
|
Term
A(n) _________ is the person who is responsible for the information, determines the level of security needed for the data and delegates security duties as required.
|
|
Definition
|
|
Term
A RADIUS __________ is a computer that forwards RADIUS messages among RADIUS clients and RADIUS servers. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
During RADIUS authentication, what type of packet includes information such as identification of a specific AP that is sending the packet and the username and password?
|
|
Definition
|
|
Term
Which federated identity management (FIM) relies on token credentials?
|
|
Definition
|
|
Term
What is the name for a predefined framework that can be used for controlling access and is embedded into software and hardware?
|
|
Definition
|
|
Term
|
Definition
|
|
Term
In the Mandatory Access Control (MAC) model, every subject and object ___________.
|
|
Definition
|
|
Term
A token __________ is a unique random string of characters that is encrypted to protect the token from being used by unauthorized parties. |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Entires within a Directory Information Base are arranged in a tree structure called the:
|
|
Definition
|
|
Term
Which of the following is a decentralized open-source FIM that does not require specific software to be installed on the desktop?
|
|
Definition
|
|
Term
The use of a single authentication credential that is shared across multiple networks is called:
|
|
Definition
|
|
Term
The capability to look up information by name under the X.500 standard is known as a(n) _______ -pages service. |
|
Definition
|
|
Term
What technology allows users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site?
|
|
Definition
|
|
Term
A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is:
|
|
Definition
|
|
Term
|
Definition
|
|
Term
What authentication service commonly used on UNIX devices involves communicating user authentication information to a centralized server?
|
|
Definition
|
|
Term
With the development of IEEE 802.1x port security, the __________ authentication server has seen greater usage.
|
|
Definition
|
|
Term
Which of the following is a set of permissions that is attached to an object?
|
|
Definition
access control list (ACL) |
|
|
Term
A(n) __________ attack begins with the attacker creating encrypted versions of common dictionary words and comparing them against those in a stolen password file. |
|
Definition
|
|
Term
Which of the following is the name given to an individual who periodically reviews security settings and maintains records of access by users?
|
|
Definition
|
|
Term
A(n) _________ is the person who is responsible for the information, determines the level of security needed for the data and delegates security duties as required.
|
|
Definition
|
|
Term
___________ is granting or denying approval to use specific resources. |
|
Definition
|
|
Term
Which type of biometrics is based on the perception, thought process and understanding of the user
|
|
Definition
|
|
Term
In the DAC model, __________ can create and access their objects freely. |
|
Definition
|
|
Term
A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as:
|
|
Definition
|
|
Term
A user or process functioning on behalf of the user that attempts to access an object is known as the:
|
|
Definition
|
|