IT Security: Defense against the digital arts - Authentication
LDAP - Lightweight Directory Access Protocol
An open industry standard protocol for accessing and maintaining directory services.
How is authentication different from authorization?
Authentication ensures you are who you say you are and authorization pertains to what you have access too.
What are some drawbacks to using biometrics for authentication?
Biometric authentication is difficult or impossible to change if compromised. and there are potential privacy concerns.
Question 10 True or false: Clients authenticate directly against the RADIUS server.
False
True or false: The Network Access Server handles the actual authentication in a RADIUS scheme.
False
What are some characteristics of a strong password?
Includes numbers and special characters and is at least 8 characters long
What elements of a certificate are inspected when a certificate is verified? Check all that apply.
Not valid before and after and trust of the signatory CA
What are the names of similar entities that a Directory server organizes entities into?
Organizational Units
What advantages does single sign-on offer?
Reduces the number of credentials and time spent authenticating
In what way are U2F tokens more secure than OTP generators?
Resistant to Pfishing attacks
In a multi-factor authentication scheme, a password can be thought of as:
something you know
What does a Kerberos authentication server issue to a client that successfully authenticates?
ticket
What is a CRL?
"Certificate Revocation List." It's a list published by a CA, which contains certificates issued by the CA that are explicitly revoked, or made invalid.