Chapter 13 Test Prep

5.0(1)
studied byStudied by 9 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards
Firewall
Protect a network with a strong firewall to prevent external intruders from gaining access to the network.
2
New cards
Network Intrusion Detection System NIDS
Implement an NIDS, or better yet, an NIPS to detect intrusion attempts. A NIPS is preferable because it can also block intrusion attempts.
3
New cards
Email Security Appliance
Implement an email security appliance to automatically scan and then quarantine any suspect messages before they reach end-users within the organization.
4
New cards
Network Access Control (NAC)
A collection of components that allow administrators to regulate network access and communication based on a computer's compliance with health requirement policies.
5
New cards
Something you know
This type of authentication requires users to provide a password or some other data that they know. This is the weakest type of authentication.
6
New cards
Something you have
This type of authentication uses something users have in their possession.
7
New cards
Something you are
This type of authentication uses a biometric system. A *biometric system* attempts to identify a person based on metrics or a mathematical representation of the subject's biological attributes. This is the most expensive and least accepted authentication method, but it is generally considered the most secure form of authentication.
8
New cards
Somewhere you are
This type of authentication uses where you are accessing the information from, such as an IP address, Coordinates, or a house address.
9
New cards
Something you do
This type of authentication uses the unique way you do something, such as writing your signature, or writing a word.
10
New cards
False Negative
Also called a Type I error, occurs when a person who should be allowed access is denied access.
11
New cards
False Positive
Occurs when person who should be denied access is allowed access.
12
New cards
Crossover Error Rate
Also called the equal error rate, is the point where the number of false positives matches the number of false negatives in a biometric system. I
13
New cards
Processing Rate
Also known as system throughput, identifies the number of subjects or authentication attempts that can be validated. An acceptable rate is at least ten subjects per minute.
14
New cards
One-Factor Authentication
Uses only one type of credential, but may require multiple methods within the same type.
15
New cards
Two, Three, or Multiple Factor Authentication
Requires two or more authentication types.
16
New cards
Strong Authentication Method
Requires two or more methods, but they can be of the same type.
17
New cards
Mutual Authentication Method
Requires that both parties authenticate with each other before beginning communications.
18
New cards
Kerberos (Auth Service)
A free protocol that provides strong authentication for client/server applications using a secret-key cryptography that allows the client to prove identity across an unsecure network connection.
19
New cards
IEEE 802.1X (Auth Service)
A port-based authentication service where the client, called supplicant, initiates the authentication. A network device, called authenticator, negotiates the authentication. An authentication server, called host, is accessed after the supplicant is authenticated.
20
New cards
Captive Portal (Auth Service)
A web page that pops up when you access a public Wi-Fi.
21
New cards
Challenge Handshake Authentication Protocol \n (CHAP)
A three-way handshake (challenge/response) authentication protocol used for remote access connections. Both connection devices are configured with a password called a shared secret. For unique user authentication, this value is associated with a user account.
22
New cards
Microsoft Challenge Handshake Authentication Protocol \n (MS-CHAP)
Microsoft's proprietary challenge-response authentication method used for remote access connections
23
New cards
Extensible Authentication Protocol \n (EAP)
Allows the client and server to negotiate the characteristics of authentication.
24
New cards
/etc/passwd
A file that contains the user account information.
25
New cards
/etc/shadow
A file that contains the user passwords in an encrypted format. This file is linked to the /etc/passwd file.
26
New cards
/etc/group
As with Active Directory, you can use groups to simplify user access to network resources. This file contains information about each group.
27
New cards
/etc/default/useradd
This file contains default values used by the useradd utility when creating a user account, such as Group ID, home directory, or account expiration.
28
New cards
/etc/login.defs
A file that contains Values used for the group and user ID numbers, parameters for passwords encryption in the shadow file and password expiration values for user accounts.
29
New cards
/etc/skel
This directory contains a set of configuration file templates that are copied into a new user's home directory when it is created, including the following files: .bashrc, .bash_logout, .bash_profile, .kshrc
30
New cards
useradd
Creates a user account.
31
New cards
passwd
Used to change a users current password.
32
New cards
usermod
esModify an existing user account.
33
New cards
userdel
Removes the user from the system.
34
New cards
Quality updates
Are deployed monthly (usually the second Tuesday of the month). Include security fixes and software updates. Include any missed updates.
35
New cards
Feature updates
Are also called builds, Created to provide new features and functions, Released as a new version of the Windows operating system.
36
New cards
Servicing stack updates
the code that installs Windows updates.
37
New cards
Driver updates
.To keep systems running smoothly, it is important to keep all of these updated. Windows update usually updates all of these that have been registered with Microsoft
38
New cards
Microsoft Product Updates
Provides updates for products such as Office.