Exam 11: Authentication and Remote Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Authorization is the matching of user-supplied credentials to previously stored credentials on a host machine,and usually involves a username and password.

Free
(True/False)
4.9/5
(31)
Correct Answer:
Verified

False

Telnet is a secure way to remotely access a computer.

Free
(True/False)
4.9/5
(40)
Correct Answer:
Verified

False

What does AAA stand for?

Free
(Multiple Choice)
4.7/5
(45)
Correct Answer:
Verified

D

A door that requires a thumbprint,key card,and password is an example of

(Multiple Choice)
4.9/5
(41)

Authentication is the granting of specific permissions based on the privileges held by the account.

(True/False)
4.8/5
(35)

Which of the following describes the wireless standard?

(Multiple Choice)
4.9/5
(36)

What protocol would you use for remote access,to get a console with an encrypted connection?

(Multiple Choice)
4.8/5
(31)

With IPsec,AH and ESP

(Multiple Choice)
4.9/5
(30)

L2TP uses

(Multiple Choice)
4.9/5
(37)

In addition to "What users know," "What users have," and "What users are," what did the author add to be able to authenticate a user?

(Multiple Choice)
4.7/5
(30)

The main weakness of SSH is that all traffic is sent in the clear.

(True/False)
4.8/5
(38)

Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network?

(Multiple Choice)
4.9/5
(39)

In Kerberos environment,the first ticket in the two-step process is the ticket-granting ticket.

(True/False)
4.8/5
(38)

_______________ is the collection of billing and other detail records.

(Short Answer)
4.7/5
(28)

Protecting the header information of a packet is referred to as _______________ protection.

(Short Answer)
4.9/5
(33)

Your boss wants you to suggest a secure way to connect to the corporate network from home.You will have to connect through the Internet.What is a possible solution?

(Multiple Choice)
4.8/5
(33)

The primary vulnerability associated with many methods of remote access is

(Multiple Choice)
4.9/5
(24)

Protecting only the data portion of a packet is referred to as _______________ protection.

(Short Answer)
4.8/5
(30)

_______________ is the matching of user-supplied credentials to previously stored credentials on a host machine.

(Short Answer)
4.8/5
(33)

Telnet traffic is encrypted by default.

(True/False)
4.9/5
(36)
Showing 1 - 20 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)