Network+ 4.2 Explain authentication and access controls

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

RADIUS (Remote Authentication Dial-Up User Service)

A protocol that enables a single server to become responsible for all remote-access authentication, authorization, and auditing (or accounting) services. Functions as a client/server system

2
New cards

TACACS+ (Terminal Access Controller Access-Control System Plus)

A security protocol designed to provide centralized validation or users who are attempting to gain access to a router of NAS. Uses TCP on port 49 by default.

3
New cards

Kerberos

A non-proprietary protocol and is used for cross-platform authentication. This is also the main authentication protocol used with windows servers. This protocol used SSO and symmetric cryptography. Security tokens are called tickets.

4
New cards

Single Sign-On

A gateway service that permits users to log in once with a single user ID and password to gain access to multiple software applications.

5
New cards

Local Authentication

Authentication done locally by the OS using values stored in it.

6
New cards

LDAP (Lightweight Directory Access Protocol)

A communications protocol that defines how a client can access information, perform operations, and share directory data on a server.

7
New cards

Certificates

A key component of PKI. A form of electronic credentials that validates users, computers, or devices on the network. A digitally signed statement that associates the credentials of a public key to the identity of the person, device, or service that holds the corresponding key.

8
New cards

Auditing and Logging

The process of monitoring occurrences and keeping a log of what has occurred on a system. This helps prevent unauthorized access, provides a records for admins to analyze and make security changes, and provides solid evidence in case of improper misconduct.

9
New cards

Multifactor Authentication Something you Know

Certain knowledge only known to the user, such as a pssword.

10
New cards

Multifactor Authentication Something you have

Some physical object in the possession of the user

11
New cards

Multifactor Authentication Something you are

Some physical characteristic of the user, also known as biometrics

12
New cards

Multifactor Authentication Somewhere you are

Some connection to a specific computer network or using a GPS signal to identify the location

13
New cards

Multifactor Authentication Something you do

Proves identities by observing actions, such as gestures or touches

14
New cards

802.1x

The standard that defines port based security for wireless networks access control. Allows APs and switches to not do the authentication but instead rely on the authentication server to do the work.

15
New cards

NAC (Network Access Control)

A method to restrict access to the network based on identity or posture. Posture assessment any evaluation of a systems security based on setting and applications found.

16
New cards

Port Security

Disabling unused application/service ports to reduce the number of threat vectors.

17
New cards

MAC Filtering

A list of MAC addresses and configured to allow to deny access to certain systems based on the list

18
New cards

Captive Portal

Forces clients using a web browser to complete a task before being able to access the network.

19
New cards

Access Control Lists

Allow or disallow traffic based on tuples.

20
New cards

IMAP (Internet Message Access Protocol)

Technical solution that forces clients using web browsers to complete a specific process before it allows them access to the network