Page 4 - Security+ (635 notes by Nikkhah)
P. 4

and expires as soon as the user logs off.
            20- Kerberos helps prevent replay and spoofing attacks.




            Challenge Handshake Authentication Protocol (CHAP)
            21- CHAP is used to verify the authenticity of the client periodically.

            22- It uses a three-way handshake even after the session has been set up.

            23- CHAP cannot work with encrypted password databases.
            24- MS-CHAP, used in Microsoft Windows networks, is considered secure.



            Digital certificates

            25- Digital certificates use digital signatures to bind the identity of a person to acertificate.
            26- A Public Key Infrastructure (PKI) is used to issue and manage certificates.

            27- A Certification Authority (CA) issues digital certificates.

            28- Certificates can be used for authentication of a user, a server, or an organization.
            29- Information on certificates includes the name of the certificate holder, the issuing authority,

            the validity dates, and the encryption method used.
            30- Web  servers  must  use  certificates  in  order  to  use  the  Secure  Socket  Layer (SSL)  for

            secure transactions.



            Username/Password

            31- The combination of username and password is used for supplying the credentials of the
            user.

            32- This method is most commonly used by all major operating systems.

            33- Password policies should enforce the use of secure passwords.
            34- Password policies require users to use long passwords with a mix of characters, to change

            passwords regularly, and to not reuse old passwords.



            Security tokens
            35- A  security  tokens  is  a  hardware  device  that  contains  the  credentials  of  a  person for

            authentication.

            36- It is considered to be the most trusted method of verifying the identity of a user.
            37- The hardware device is coded to generate token values at predetermined intervals.

            38- The software component of the token tracks and verifies that these codes are valid.


                   www.hrnikkhah.com                        by :  Hamid  Reza  Nikkhah                 Page 2
   1   2   3   4   5   6   7   8   9