Exam 3: Authenticating Users

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What types of one-time passwords are available?

(Essay)
4.9/5
(36)

Some firewalls use authentication to give employees access to common resources.

(True/False)
4.7/5
(29)

The ____________________ password system, which is a feature of the Linux operating system that enables the secure storage of passwords, stores them in another file that has restricted access.

(Short Answer)
4.8/5
(33)

Match each item with a statement below. -Implemented at the discretion of the data user.

(Multiple Choice)
4.9/5
(35)

Describe security clearances.

(Essay)
4.9/5
(32)

Linux stores passwords in the ____ file in encrypted format.

(Multiple Choice)
4.9/5
(33)

____________________ is the act of confirming the identity of a potential user.

(Short Answer)
4.8/5
(36)

For most information, the U.S.military uses a classification scheme with ____ as the uppermost tier.

(Multiple Choice)
4.8/5
(32)

A simple scheme can allow an organization to protect sensitive information, such as marketing or research data, personnel data, customer data, and general internal communications classifies data.Which of the following categories would most likely be used for internal phone lists?

(Multiple Choice)
4.8/5
(21)

To configure client authentication, you need to set up one of two types of authentication systems: ____ and ____.

(Multiple Choice)
4.7/5
(25)

Public-Key Infrastructure (PKI) must be used for ____ authentication.

(Multiple Choice)
4.8/5
(31)

____ use(s) a challenge-response system.

(Multiple Choice)
4.8/5
(27)

Match each item with a statement below. -Determining which actions an entity can perform in that physical or logical area.

(Multiple Choice)
4.8/5
(32)

Describe the differences between local and centralized authentication.

(Essay)
4.9/5
(40)

Lattice-based access control is a variation of ____ access control.

(Multiple Choice)
4.9/5
(36)

Compare TACACS+ and RADIUS with regard to strength of security.

(Essay)
4.7/5
(42)

What are the four processes encompassed by access control?

(Essay)
4.8/5
(39)

Most organizations do not need the detailed level of classification used by the military or federal agencies.

(True/False)
4.8/5
(27)

What is a disadvantage of centralized authentication?

(Essay)
4.9/5
(35)

IEEE 802.1x is one of the fastest growing standards being used in enterprise networks today.

(True/False)
4.9/5
(39)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)