(Latest Update )
Cybersecurity Architecture and
Engineering | Questions and
Answers | Grade A | 100% Correct
(Verified Solutions)
Question:
single sign-on (SSO)
Answer:
Using one authentication credential to access multiple accounts or
applications. In Windows this is provided by the Kerberos framework.
Question:
Remote Authentication Dial-In User Service (RADIUS)
Answer:
The RADIUS client is configured with the IP address of the RADIUS server
and with a shared secret. Clients are switches and access points or VPN
gateways and lot user laptops. This was developed in the time of dial up
networking.
,Question:
Diameter
Answer:
Improves upon RADIUS by strengthening upon some of its weakness such as
having a failover mechanism because it is TCP based while RADIUS doesn't
since it is UDP based.
Question:
Terminal Access Controller Access-Control System Plus (TACACS+)
Answer:
CISCO developed this authentication protocol and is a reliable connection
oriented using port 49 that encrypts all data in its packets.
Question:
Light Directory Access Protocol (LDAP)
Answer:
A directory services protocol that runs over TCP/IP networks. The LDAP
schema is extensible, meaning it can added to or changed.
,Question:
Secure LDAP (LDAPS)
Answer:
A method of implementing LDAP using SSL/TLS encryption protocols to
prevent eavesdropping and man-in-the-middle attacks
Question:
Kerberos Authentication
Answer:
An authentication protocol used in a Windows domain environment or on a
Linux system; uses OS-generated keys, which makes this protocol more
secure than having an administrator enter key. Two services make up this
system the authentication service and the ticket granting service
Question:
Open Authorization (OAuth)
Answer:
The OAuth 2.0 authorization framework enables a third-party application to
obtain limited access to an HTTP service, either on behalf of a resource owner
by orchestrating an approval interaction between the resource owner and the
HTTP service, or by allowing the third-party application to obtain access on
its own behalf.
, Question:
Extensible Authentication Protocol (EAP)
Answer:
A framework for transporting authentication protocols that defines the
format of the messages.
Question:
802.1x
Answer:
A port-based authentication protocol. Wireless can use 802.1X. For example,
WPA2-Enterprise mode uses an 802.1X server (implemented as a RADIUS
server) to add authentication.
Question:
Identity proofing
Answer:
The process of collecting and verifying information about a person for the
purpose of proving that a person who has requested an account, a credential,
or other special privilege is indeed who he or she claims to be and establishing
a reliable relationship that can be trusted electronically between the
individual and said credential for
purposes of electronic authentication.