Lesson 7 Implementing Authentication Controls
Lesson 7 Implementing Authentication Controls
1.C
2.B
3.D
The authentication server and client token are configured with the same
shared secret in HOTP.
The HOTP server is configured with a counter, combining with the shared
secret to create a one-time password. When the HOTP value is authenticated,
it increments by one.
The server and the device both compute the hash and derive a 6-8 digit
HOTP value.
4.BCD
RADIUS uses UDP by default over ports 1812 and 1813 and TACACS+ uses
TCP on port 49.
TACACS+ encrypts the whole packet (except the header, which identifies the
packet as TACACS+ data) and RADIUS only encrypts the password portion of
the packet using MD5.
RADIUS is primarily used for network access for a remote user and
TACACS+ is primarily used for device administration. TACACS+ provides
centralized control for administrators to manage routers, switches, and firewall
appliances, as well as user privileges.
RADIUS is an open-source protocol, not TACACS+. TACACS+ is a Cisco
proprietary protocol.
5.AC
Inputting a correct PIN authorizes the smart card's cryptoprocessor to use its
private key to create a Ticket Granting Ticket (TGT) request to an
Authentication Server (AS).
The AS can place trust when the user's certificate is issued by a local or third-
party root certification authority.
An AS responds with a TGT and Ticket Granting Service (TGS) session key,
not the smart card.
6.C
Clogging a company's pipe in and out of the network would be considered a Denial of
Service (DoS) attack. The attacker can do this various ways, one example is to keep
trying to connect to a device that is externally facing. A company can throttle
connections to mitigate DoS attacks.
A brute force attack is where an attacker uses an application to exhaustively try every
possible alphanumeric combination to crack encrypted passwords. Restricting logon
attempts is a way to mitigate this threat, not be vulnerable to it.
7.C
A brute force attack attempts every possible combination in the key space in order to
derive a plaintext password from a hash. The key space is determined by the number
of bits used.
A hybrid password attack uses a combination of dictionary and brute force attacks. It
is principally targeted against naively strong passwords. The password cracking
algorithm tests dictionary words, and names in combination with several numeric
prefixes.
A rainbow table attack refines the dictionary approach. The attacker uses a
precomputed lookup table of all possible passwords and their matching hashes.
A dictionary attack can be used where there is a good chance of guessing the likely
value of the plaintext, such as a non-complex password.
8.A
By creating and sending the initial password over a Virtual Private Network (VPN),
the administrator is implementing secure transmission of credentials identification
process.
9.B
Using a password and a PIN is not 2FA since they both are “something you
know.”
Using a fingerprint and a retinal scanner is not 2FA since they both are
“something you are.”
Using a smart card and a key fob is not 2FA since they both are “something
you have.”
10.AB
A typical hybrid password attack uses a combination of dictionary and brute force
attacks.
Salt is a random or pseudo-random number or string. The term salt is used specifically
in conjunction with hashing password values.
A pass the hash (PTH) attack occurs when an attacker obtains the hash of a user's
password and presents the hash (without cracking it) to authenticate to network
protocols.
11.A
RADIUS can implement the authentication server role, but does not provision
the full set of supplicant, authenticator and authentication server roles
required for a VPN topology.
12.A
A false negative is where a legitimate user is not recognized, denying the user
access and causing the user an inconvenience. This event does not result in
a breach. This is the False Rejection Rate (FRR).
The Crossover Error Rate (CER) is the point at which FRR equals FAR. A
lower CER indicates more efficient and reliable authentication.
13.A
The false rejection rate (FRR) is also known as a type I error, which rejects
authorized templates.
The false acceptance rate (FAR) is the rate at which the system lets in
unauthorized users, which constitutes a security breach.
A type II error is a false positive, measured by the false acceptance rate
(FAR). This is the rate at which unauthorized personnel gain access to the
secure facility.
14.D
The password does not contain special characters, and also contains words that are
found in the dictionary. Both of these attributes make the password vulnerable.
The length of the password may be sufficient based on the rules set forth by the
system administrator and company policy. The company policy may or may not
require the use of special characters, and this is unknown from the scenario.
The password is insufficiently complex. The inclusion of uppercase letters alone does
not make a password complex.
While it is correct that the user may be able to remember this password easily, that
also makes it susceptible to attack. Dictionary words make it that much easier for an
attacker to crack the password.
15.B
16.B
Biometric authentication based on a retinal scan is the hardest method to fool. Retinal
scanning is used to identify the patterns of blood vessels with the eye, whereas an iris
scan only uses the surface of the eye.
It is possible to obtain a copy of a user's fingerprint and create a mold of it that will
fool a fingerprint scanner.
Facial recognition suffers from relatively high false acceptance and rejection rates,
and as a result is vulnerable to spoofing.
17.C
Identification controls are to ensure that customers have unique accounts, and that
only they can manage their orders and billing information. An example is to require
each customer create an account prior to allowing them to store billing or shipping
information.
Authentication controls are to ensure that customers have unique accounts, and that
only they can manage their orders and billing information. An example is to require
each customer create an account prior to allowing them to store billing or shipping
information.
Verifying address or other information is more of a validation task rather than an IAM
control.
18.AB
The AS issues a TGT to the client after successful authentication, and it contains
information about the client, including their name and IP address, along with a
timestamp and validity period. The TGT is encrypted with the secret key of the
Authentication Server (AS) to ensure its confidentiality and integrity during
transmission and storage.
The TGS issues service tickets to the client, and these tickets contain a session key
that is shared between the client and the requested service. The TGT does not contain
any service session key for use between the client and the application server.
The TGT is time-stamped. This means that workstations and servers on the network
must be synchronized (to within five minutes), or a TGT will be rejected. This helps
prevent replay attacks.
The TGT is not a credential that the client uses to authenticate to the AS. The TGT is
issued to the client by the AS after successful authentication, and it contains a session
key that is used to authenticate the client to the TGS when requesting a service ticket.
19.AD
Signature recognition is not based on the actual signature due to it being easy
to replicate. Instead, it is based on the process of applying a signature such
as stroke, speed, and pressure of the stylus.