PKI
Authenticate
Authorization
MDM
MDM Use
Networking Solutions
Wireless Security
Identity
100

What does PKI stand for?

What is Public key infrastructure (PKI)

100

What is SAML?

What is Security Assertion Markup Language (SAML), Web-based SSO and it is XML-based.  (SAML) allows the transfer of information about an individual, who they are (authentication) and what they have access rights to (authorization).


100

What is MAC?

What is MAC Mandatory Access Control.  In a mandatory access control (MAC) model, the operating system is in control of access to data.  In other words you have no control the OS rules decides everything.

100

In MDM what is Content management?

Content Management also includes controlling the content on the mobile device itself.  This functionality covers content change and updates, as well as versioning control between those changes.  This ensures not only that files are kept up to date and records of changes are maintained (either as metadata or as a separate record) but also that file inconsistency and concurrent use issues are prevented and resolved when they occur.

100

What is Rooting/jailbreaking?

The terms rooting and jailbreaking refer to bypassing a mobile device’s restrictions to use it in ways that were not intended by the manufacturer or mobile service carrier.  Jailbreaking specifically refers to bypassing software restrictions on an iOS device to run apps that are not approved by Apple and not available on the official App Store.  Jailbreaking also allows a user to unlock functionality on the device.  Jailbreaking an iPhone can unlock that functionality and allow other devices to use the iPhone’s connection to the Internet.

100

What does a load balencer do?

What is a load balancer receives traffic for other devices.  The load balancer, forwards the relevant traffic to each resource behind it.

100

What are Captive portals?

What is A captive portal setup allows a wireless client to connect to the wireless network and reach only a single Web site, where the users must authenticate to the wireless network before they can use it any further.



100

What is the difference between a smart card and a token authentication?

A token generates a unique code each time, whereas smart card has the code within it.

200

What is a CA and do they do?

What is Certificate authority (CA) and they verify your public key as reputable

200

What is EAP?

What is the Extensible Authentication Protocol (EAP)
The authenticator (switch or wireless access point) periodically sends EAP requests to a MAC address on the network.  The supplicant listens for this address and sends an EAP response that might include a user ID or other similar information.  The authenticator encapsulates this response and sends it to the authentication server.

200

Define RBAC?  Give me Both


What is RBAC Role Based Access Control.  Rule Based Access Control.  What role do you do.  Roles are for people and Rules are for objects

200

What nefarious purpose is Apple Airtags being used for?

To track people or cars

200

What is Sideloading?


Sideloading is for Android users that install apps from other sources in addition to the Google Play store (a process known as sideloading). These apps may come from independent app developers or enterprise-specific app stores created to develop applications specifically for the mobile users of a particular organization. Sideloading can also refer to the loading of apps through a nonstandard process, such as via USB drive or other mechanism, rather than through the more traditional download process.

200

What is Transitive Trust in Federation?



What is Federated identities center around the foundational concept of transitive trust, where the trust relationship between two domains allows authentication of trusted users across both domains. Transitive trust requires the two (or more) organizations to agree on standards for sharing identity attributes and for the organizations to accept and authenticate identities based on attributes received from external organizations.

200

What is the difference between EAP-TLS to EAP-TTLS?  

EAP-TTLS goes beyond the TLS protocol, adding a tunnel to provide better security.  EAP-TTLS only requires a server-side certificate.  EAP-TTLS is considered to be functionally equivalent to PEAP

200

What is Geofencing?

What is a way to allow or deny access bassed on location

300

What is an RA and what do they do?

What is Registration Authority (RA) and Used to verify requests for certificates.  The RA informs the CA to issue the certificate. An RA might also be used if the organization deals with several CAs.  The RA is at the top of a hierarchical structure and verifies the identity of the user.



300

What is TPM?

What is Trusted platform module (TPM) A chip residing on the motherboard that stores the encrypted keys.

300

What is DAC?


What is Discretionary access control (DAC).  Remember Read, Write, and Execute, the owned of the data has full control of whom is given what access to what

300

In MDM what is Remote wipe used for?

As a protection against stolen or lost device access, many mobile devices have the capability to remotely delete their contents, commonly called remote wipe.  Your mobile device can be tracked by its hardware address, and you can use a management application or a web browser application to initiate a remote wipe of the device so that all your data is deleted.

300

What is Tethering?


Tethering is the ability to connect to wireless ad hoc networks, tethering (use of the data plan to create a wireless access point)

300

AES as the encryption algorithm but, what process or mode is used to encrypt traffic?

What is Counter-mode (CTR) Cipher Block Chaining Message Authentication Code Protocol (CMC-MAC) or, adding it all together, CCMP. CCMP uses a 128-bit key and 128-bit block size (since it is a block symmetric cipher.

300

What protocol does Protected Extensible
Authentication Protocol (PEAP) use?


What is 802.11

300

What three types of password account policies should be enforced and give one example for each

 What is:

Password complexity
Password history
Password reuse

400

What is a CRL, and what does it do?

What is Certificate revocation list (CRL), is a list of certificates that are no longer valid or that have been revoked by the issuer.
 

400

What is an HSM?

What is a Hardware security modules (HSMs).  They are physical devices that act as secure cryptoprocessors. They are used for encryption during secure login/authentication processes, during digital signings of data, and for payment security systems. Hardware-based encryption device such as an HSM (or a TPM) is that it is faster than software encryption.

400

What is ABAC?

What is Attribute-based access control (ABAC).  Access rights are granted through multiple policies that can combine user, group, and resource attributes together.
Or if Alice works in human resources, she would have attributes associated with her as a subject (Alice, HR Specialist, HR Department).  An object example, the HR database, with attributes covering its personally identifiable information (PII) data on employees.

400

In MDM what is Context-aware authentication?

In context-aware authentication MFA is taken a bit further by requiring different authentication based on the context in which access to a data asset is attempted.  For example, a user attempting access within the geofenced proximity of the organization might require less stringent authentication than a user who is not within that location.  The data to be accessed can also be a factor used to make a context-aware authentication decision.

400

What is USB OTG?

USB On-The-Go (USB OTG): USB On-The-Go (OTG) was developed as a mechanism to plug devices such as external drives, cameras, keyboards, and mice into smartphones or tablets. For example, when an external storage drive is connected via USB OTG, it then presents on the compatible mobile device as a drive that can be read from and written to. It’s a very cool way to add functionality to a mobile device but presents security concerns just as any USB drive would if plugged into a desktop system, including the ability to transmit malware.

400

What does a Remote Authentication Dial-In User Service (RADIUS) server use to authenticate access.

What is it compares the user’s authentication credentials against those of the server’s database. If the credentials match, the user is granted access to the rest of the network. The client’s credentials that are sent to the RADIUS server are encrypted to prevent someone from capturing the transmission. RADIUS servers also include accounting and reporting functions that can monitor and log data on each connection, such as packet and protocol types, as well as the length of time connected.

400

Remote Authentication Dial-in User Service (RADIUS) Federation uses what protocol?


What is IEEE 802.1X

400

What does IdP means and give me the two most common examples of this?

What is  Identity provider (IdP):  XML-based SAML Security Assertion Markup Language and OpenID Connect protocol

Web-based SSO can be problematic due to disparate proprietary technologies. To help the XML-based Security Assertion Markup Language (SAML) and the OpenID Connect protocol were developed. OpenID Connect is an interoperable authentication protocol based on the OAuth 2.0 family. It uses straightforward REST/JSON message flows with a design goal of “making simple things simple and complicated things possible.” Both OpenID Connect and SAML specify separate roles for the user, the service provider, and the identity provider. Shibboleth is also based on SAML.

500

What is OCSP?

What is Online Certificate Status Protocol (OCSP)

(OCSP). It contains less information than a CRL does, and the client side of the communication is less complex. However, OCSP does not require encryption, making it less secure than CRL.


500

What is PAP and how does it send password?

What is and PAP Password Authentication Protocol, which sends usernames and passwords in clear text obviously insecure and to be avoided.

500

What in Kerberos is needed to access anything?

What is Kerberos and Tickets 

500

In MDM what is Geolocation, and what legal issues could you face?

Geolocation can be used to retive item or track an item, and Many mobile devices, primarily smartphones, contain Global Positioning System (GPS) chips so that they can be tracked by and use the services of GPS satellites.

500

What is a HSM?

What is (HSM)Hardware Security Modules.  Many processes take advantage of asymmetric key storage, authentication, encryption/decryption, and other functions can often swamp CPUs and operating systems. For Web servers, ATMs, or other applications that perform high amounts of key handling, it’s beneficial to offload this work to a hardware security module (HSM).

500

What is the basic placement difference between a hardware and software based firewall?

What is hardware are placed on the network and software are on a host

500

Why was LEAP replaced with EAP-FAST?






What is LEAP was replaced with EAP-FAST (for Flexible Authentication via Secure Tunneling), which addresses LEAP’s security issues. EAP-FAST is lightweight but uses TLS tunnels to add security during authentication

500

What is Impossible travel time/risky login?

What is Impossible travel time: location hopping that is not possible

risky login: using behavior analytics of a number of inputs, including login location, previous user behavior, and activities that have been flagged for known attack behaviors. If the risk is calculated to be high, policy can be enforced to block access completely, allow access, or only allow access with successful multifactor authentication.

600

What is used to combat a bad actor trying to take over a CA and quickly update the entire PKI for that CA, generating perfectly legal (chain-wise) certificates. where the users must authenticate to the wireless network before they can use it any further.


What are HPKP pins, they are stored hashes of the public key that the host machines can compare to verify that the public key inside the certificate is the same as anticipated.  where the users must authenticate to the wireless network before they can use it any further.


600

What two shared authentication schemes use various protocols, languages, and mechanisms to provide easier access to online resources for people.

What, are SAML and OpenID Connect.

600

What does SAML use for Authorization?

What is OAuth for authorization. OAuth enables things like users granting information to Web sites without revealing their passwords.

600

What is BYOD, COPE, CYOD, and Corporate-owned. 


 

What is Bring your own device (BYOD)
Corporate-owned personally enabled (COPE)
Choose your own device (CYOD)
Corporate-owned

600

In MDM what is Application management?

What is Application management or what app you will allow on a device or not allow

600

What is the difference between a Stateful and a Stateless firewall?

What is Stateless A stateless firewall looks at every incoming packet individually without considering anything else that might be taking place based off of an ACL.

Stateful firewalls understands the procedures and processes of Internet protocols and filters communication that is outside of proper procedures. A stateful firewall understands several functions expected in normal TCP and UDP communication and looks for the 3 way handshake.


600

What does LEAP use dynamic WEP keys to sign into?



What is RADIUS server.  It provides for mutual authentication between wireless clients and a centralized RADIUS server. LEAP requires wireless clients to reauthenticate periodically, and when they do, they must use a new WEP key.

600

What is Geotagging?

What is Geotagging allows for an automatic tag to be applied based on time and location, for example. This also can be used as a mechanism to determine access levels and controls associated with the location and identity of a user.

M
e
n
u