Answers and explanations

  1. A password is most likely to be entered incorrectly; the user may forget the password or may have the caps lock set-up incorrectly.
  2. When purchasing any device, you should change the default username and password as many of these are available on the internet and could be used to access your device.
  3. Password history is the number of passwords you can use before you can reuse your current password. Some third-party applications or systems may call this a Password Reuse list.
  4. Password history could be set up and combined with minimum password age. If I set the minimum password age to 1 day, a user could only change their password a maximum of once per day. This would prevent them from rotating their passwords to come back to the old password.
  5. A complex password uses three of the following; uppercase, lowercase, numbers, and special characters not used in programming.
  6. If I set up an account lockout with a low value such as three, the hacker needs to guess your password within three attempts or the password is lockout, and this disables the user account.
  7. A smart card is multi-factor or dual factor as the card is something you have and the PIN is something you know.
  8. A password, PIN, and date of birth are all factors that you know, therefore it is single factor.
  9. Biometric authentication is where you use a part of your body or voice to authenticate, for example your iris, retina, palm, or fingerprint.
  10. Federated services are an authentication method that can be used by two third parties; this uses SAML and extended attributes such as employee or email address.
  11. Security Assertion Mark-up Language (SAML) is an XML-based authentication protocol used with federated services.
  12. Shibboleth is a small open source Federation Services protocol.
  13. Lightweight Directory Authentication Protocol (LDAP) is used to stores objects in a X500 format and search Active Directory objects such as users, printers, groups, or computers.
  14. A distinguisher name in the ITU X500 object format is: CN=Fred, OU=IT, CN=Company, DC=Com.
  1. Microsoft's Kerberos authentication protocol is the only one that uses tickets. It also uses time stamps and updated sequence numbers and is used to prevent replay attacks.
  2. Stratum 0 is the reference time source. Stratum 1 is set up internally to obtain time from the Stratum 0.
  3. A Ticket Granting Ticket (TGT) process is where a user logs into an Active Directory domain using Kerberos authentication.
  4. Single sign-on is where a user inserts their credentials only once and access different resource such as emails and files without needing to re-enter the credentials. Examples of this are Kerberos, Federated Services, and a smart card.
  5. Pass the hash attacks exploit older systems such as Microsoft NT4.0, which uses NT Lan Manager. You can prevent is by disabling NTLM.
  6. Open ID Connect is where you access a device or portal using your Facebook, Twitter, Google, or Hotmail credentials. The portal itself does not manage the account.
  7. The first AAA server is Microsoft RADIUS, using TCP Port 1812—it is seen as non-proprietary. The second is CISCO TACACS+ and uses TCP Port 49. Diameter is a more modern secure form of RADIUS.
  8. Accounting in an AAA server is where they log the details of when someone logs in and logs out; this can be used for billing purposes. Accounting is normally logged in a database such as SQL.
  9. A VPN solution creates a secure to connect from a remote location to your corporate network or vice versa. The most secure tunneling protocol is L2TP/IPSec.
  10. PAP authentication uses a password in clear text; this could be captured easily by a packet sniffer.
  11. An iris scanner is a physical device used for biometric authentication.
  12. Facial recognition could be affected by light or turning your head slightly to one side; some older facial recognition systems accept photographs. Microsoft Windows Hello is much better as it uses infrared and is not fooled by a photograph or affected by light.
  13. Type II in biometric authentication is Failure Acceptance Rate, where people that are not permitted to access a tour network are given access.
  14. Time based one time password has a short time limit of 30-60 seconds.
  1. HOTP is a one-time password that does not expire until it is used.
  2. A CAC is similar to a smart card as it uses certificates, but the CAC card is used by the military, has a picture, and the details of the user on the front and their blood group and Geneva convention category on the reverse side.
  3. IEE802.1x is port-based authentication that authenticates both users and devices.
  4. A service account is a type of administrative account that allows an application to have the higher level of privileges to run on a desktop or server. An example of this is using a service account to run an anti-visas application.
  5. A system administrator should have two accounts: a user account for day-to-day tasks and an administrative account for administrative tasks.
  6. When I purchase a baby monitor I should rename the default administrative account and change the default password to prevent someone using it to hack my home.
  7. A privilege account is an account with administrative rights.
  8. When monitoring and auditing are carried out, the employees responsible cannot be traced while more than one-person shared accounts. Shared accounts should be eliminated for monitoring and auditing purposes
  9. Default accounts and passwords for devices and software can be found on the internet and used to hack your network or home devices. Ovens, TVs, baby monitors, and refrigerators are examples.
  10. The system administrator is using a standard naming convention.
  11. When John Smith leaves the company, you need to disable his account and reset the password. Deleting the account will prevent access to data he used.
  12. Account recertification is an audit of user account and permissions usually carried out by an auditor; this could also be known as user account reviews.
  13. A user account review ensures that old accounts have been deleted—all current users have the appropriate access to resources and not a higher level of privilege.
  14. A SIEM system can carry out active monitoring and notify the administrators of any changes to user account or logs.
  15. Following an audit, either change management or a new policy will be put in place to rectify any area not conforming to company policy.
  16. The contractor's account should have an expiry date equal to the last day of the contract.
  17. Rule-based access should be adopted so that the contractors can access the company network 9 a.m.-5 p.m. daily.
  18. Time and day restrictions should be set up against each individual's user account equal to their shift pattern.
  19. Account Lockout with a low value will prevent brute-force attacks.
  20. Create a group called IT apprentices then add the apprentices accounts to the group. Give the group read access to the IT data.
  21. The credential manager can be used to store generic and Windows 10 accounts. The user therefore does not have to remember them.
  22. The company should have disabled the account. A user account review needs to be carried out to find accounts in a similar situation.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.31.240