How Is Authentication Different From Authorization

Question: How is authentication different from authorization?

Answer: authentication is verifying an identity, authorization is verifying access to a resource; Authentication is proving that an entity is who they claim to be, while authorization is determining whether or not that entity is permitted to access resources.

Question: What are some characteristics of a strong password? Check all that apply,

Answer: is at least eight characters long

includes numbers and special characters; A strong password should contain a mix of character types and cases, and should be relatively long — at least eight characters, but preferably more.

Question: In a multi-factor authentication scheme, a password can be thought of as:

Answer: something you know; Since a password is something you memorize, it’s something you know when talking about multi-factor authentication schemes.

Question: What are some drawbacks to using biometrics for authentication? Check all that apply.

Answer:

Question: In what way are U2F tokens more secure than OTP generators?

Answer: they’re resistant to phishing attacks; With one-time-password generators, the one-time password along with the username and password can be stolen through phishing. On the flip side, U2F authentication is impossible to phish, given the public key cryptography design of the authentication protocol.

Question: What elements of a certificate are inspected when a certificate is verified? Check all that apply.

Answer: “not valid before” date

trust of the signatory CA

“not valid after” date; To verify a certificate, the period of validity must be checked, along with the signature of the signing certificate authority, to ensure that it’s a trusted one.

Question: What is a CRL?

Answer: Certificate Revocation List; CRL stands for “Certificate Revocation List.” It’s a list published by a CA, which contains certificates issued by the CA that are explicitly revoked, or made invalid.

Question: What are the names of similar entities that a Directory server organizes entities into?

Answer: organizational units; Directory servers have organizational units, or OUs, that are used to group similar entities.

Question: True or false: The Network Access Server handles the actual authentication in a RADIUS scheme.

Answer: false; The Network Access Server only relays the authentication messages between the RADIUS server and the client; it doesn’t make an authentication evaluation itself.

Question: True or false: Clients authenticate directly against the RADIUS server.

Answer: false; Clients don’t actually interact directly with the RADIUS server; the authentication is relayed via the Network Access Server.

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.