Exam 11: Authentication and Remote Access
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Authorization is the matching of user-supplied credentials to previously stored credentials on a host machine,and usually involves a username and password.
Free
(True/False)
4.9/5
(31)
Correct Answer:
False
Telnet is a secure way to remotely access a computer.
Free
(True/False)
4.9/5
(40)
Correct Answer:
False
A door that requires a thumbprint,key card,and password is an example of
(Multiple Choice)
4.9/5
(41)
Authentication is the granting of specific permissions based on the privileges held by the account.
(True/False)
4.8/5
(35)
What protocol would you use for remote access,to get a console with an encrypted connection?
(Multiple Choice)
4.8/5
(31)
In addition to "What users know," "What users have," and "What users are," what did the author add to be able to authenticate a user?
(Multiple Choice)
4.7/5
(30)
The main weakness of SSH is that all traffic is sent in the clear.
(True/False)
4.8/5
(38)
Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network?
(Multiple Choice)
4.9/5
(39)
In Kerberos environment,the first ticket in the two-step process is the ticket-granting ticket.
(True/False)
4.8/5
(38)
_______________ is the collection of billing and other detail records.
(Short Answer)
4.7/5
(28)
Protecting the header information of a packet is referred to as _______________ protection.
(Short Answer)
4.9/5
(33)
Your boss wants you to suggest a secure way to connect to the corporate network from home.You will have to connect through the Internet.What is a possible solution?
(Multiple Choice)
4.8/5
(33)
The primary vulnerability associated with many methods of remote access is
(Multiple Choice)
4.9/5
(24)
Protecting only the data portion of a packet is referred to as _______________ protection.
(Short Answer)
4.8/5
(30)
_______________ is the matching of user-supplied credentials to previously stored credentials on a host machine.
(Short Answer)
4.8/5
(33)
Showing 1 - 20 of 46
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)