Security+ Authentication Methods

Taken straight from a course i took

25 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
What is Non-Repudation?
The Ability to prove that a transaction has occured.
What is Authentication?
Determining the identity of a person, Host or Process Via a Trusted Process.
What is Authorization?
The Act of recognizing an authenticated person, host or process defined on a particular host or authentication system.
What is Access Control?
Allowing an authorized person, host or process to access a resource.
What is Risk?
Describes overall Exposure experienced by a network or business.
What is Single Sign-On Authentication?
The Ablitiy for a user, host or process to authenticate once to access multiple resources.
What is the purpose of a Kerberos Server?
It acts as a trusted third party that stores secret keys.
At what level of the OSI Model does IPsec Occur?
The Network Layer
What are two types of Mutual Authentication?
Simple and Complex
What is Simple Authentication?
Systems do not use a Third party to authenticate with each other.
What is Complex Authentication?
A trusted third party contains of Generates and manages all authentication data.
What type of application is John the Ripper?
A Password-Cracking Application.
In a Kerberos Scheme, What is Each participating User, Host or Process Called?
A Principal
What type of Key Encryption does Kerberos use?
Symmetric-Key Encryption.
What is the Purpose of a Key Distrobution Center (KDC)?
It provides Session Keys to Authenticated Users.