Study sets, textbooks, questions
Upgrade to remove ads
Zetworking Chapter 13.5 to 13.8 Terms
Get Quizlet's official Network+ - 1 term, 1 practice question, 1 full practice test
Terms in this set (23)
Type 1 error occurs when a person who should be allowed access is denied access. The false rejection rate (FRR) is a measure of the probability that a false negative will occur.
A type 2 error occurs when a person who should be denied access.
Crossover Error Rate
Also called the equal error rate, it is the point where the number of false positives matches the number of false negatives in a biometric system.
System throughput, identifies the number of subjects or authentication attempts that can be validated. An acceptable rates.
A free protocol that provides strong authentication service where the client initiates the authentication, a network device negotiates the authentication, and an authentication server is accessed after the supplicant is authenticated.
A port based authentication service where the client initiates the authentication, a network device negotiates the authentication and an authentication server is accessed after the supplicant is authenticated.
A web page that pops up when you access a public wi-fi. This portal usually summarizes terms disclosing types of activities the wi-fi provider is not liable for during public access.
A digital document that identifies a user or computer. The certificate includes a subject name, which is the name of a user or a computer.
Authentication Type 1: Something you know
This Authentication requires users to provide a password or some other data they know. This is the weakest authentication method.
Authentication Type 2: Something you have
This Authentication requires is based on something users have i n their possession such as Swipe Cards, Photo ID, Smart cards or a token.
Authentication type 3: Something you are
This authentication uses a biometric system that attempts to identify a person based on metrics, or a mathematical representation of the subjects biological attributes. This is the most expensive and least accepted authentication method but is generally considered the most secure form of authentication.
Authentication Type 4: Somewhere you are
This method takes into consideration where you are accessing the information from like an IP address, coordinates, address and area code.
Authentication type 5: Something you do
Takes into account the unique way you do something such as signing your name, writing a specific word or phrase and writing numbers.
Challenge Handshake Authentication Protocol (CHAP)
A three-way handshake authentication protocol used for remote access connections. Both devices are configured with a password called a shared secret. For user authentication, the server generates a challenge message and sends it to the client, which responds with the username and value created using a one-way hash. The server then checks the response and if valid, authenticates the client.
Secure Sockets Layer (SSL)
A protocol used to secure connections between servers and network application clients over an unsecure network, such as the internet.
Transport Layer Security (TLS)
An improved version of SSL, and like SSL this is a cryptographic protocol that provides communications security over a computer network.
Secure Socket Shell (SSH)
A network protocol that provides administrators with secure way to access a remote computer.
Virtual Private Network (VPN)
A type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network. Used primarily to support secure communications over an untrusted network?
DoS (Denial of Service) and DDoS (Distributed Denial of Service)
An attack that impacts a system's availability by flooding the target system with traffic or requests by exploiting a system or software flaw.
Ping of Death
Attack uses the ping utility to send oversized ICMP packets (larger than 65,536 bytes). The attacker sends a ping of death packet directly to the victim, which overflows the memory buffers on that system and causes it to freeze, crash, or reboot.
Spoofed ARP messages are sent to hosts on an Ethernet LAN that contain false source MAC addresses. By doing this, the arp tables on each host are updated with incorrect information.
The process of capturing all network frames being transmitted. Network card must be in promiscuous mode.
Unprotected access method or pathway into a network system.
Sets found in the same folder
Zetworking Chapter 6.1 to 6.7 Questions
Zetworking Chapter 14.1 to 14.3 Questions
Zetworking Chapter 9.1 to 9.5 Questions
Zetworking Chapter 14.1 to 14.3 Terms
Sets with similar terms
411 Chapters 5-6 Terms
CIS test 3 part 2
IT Essentials 6.0 and Cybersecurity Essentials
Network Management - Exam 2
Other sets by this creator
Security Pro Chapter 3.1 to 3. Questions
Security Pro Chapter 3.1 to 3. Terms
Security Pro Chapter 2.1 to 2. Questions
Security Pro Chapter 2.1 to 2. Terms
Other Quizlet sets
Kaplan Exam Study Guide
Psychological Disorders Exam #1 - (Theoretical Per…