Exam 11: Authentication and Remote Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects?

(Multiple Choice)
4.8/5
(35)

TACACS+ uses

(Multiple Choice)
4.9/5
(24)

________ is the encapsulation of one packet within another.It allows you to hide the original packet from view.

(Short Answer)
4.8/5
(44)

Which of the following protocols involves a two-way handshake in which the username and password are sent across the link in clear text?

(Multiple Choice)
4.7/5
(35)

_______________ authentication is a term that describes the use of more than one authentication mechanism at the same time.

(Short Answer)
4.9/5
(26)

One of the fundamental design aspects of TACACS+ is the separation of authentication,authorization,and accounting.

(True/False)
4.9/5
(26)

The two protocols used in IPSec to provide traffic security are _________ and __________.

(Short Answer)
4.8/5
(28)

RADIUS is a remote authentication protocol the uses UDP port 1812.

(True/False)
4.9/5
(35)

Which of the following types of access control would you use to grant permissions based on the decision of the owner of an object?

(Multiple Choice)
4.7/5
(39)

The 802.1x standard is for a protocol to support communications between a user and a(n)

(Multiple Choice)
4.8/5
(37)

RADIUS uses

(Multiple Choice)
5.0/5
(39)

_______________ describes a process in which each side of an electronic communication verifies the authenticity of the other.

(Short Answer)
4.7/5
(26)

What does RADIUS stand for?

(Multiple Choice)
4.8/5
(34)

With IPsec,security associations are used to establish the logical set of security parameters designed to facilitate the sharing of information between entities.The security association protects

(Multiple Choice)
4.8/5
(37)

Which type of access control would allow the company to restrict employee access to the payroll file after hours or on weekends?

(Multiple Choice)
4.9/5
(34)

_______________ is the granting of specific permissions based on the privileges held by the account.

(Short Answer)
4.8/5
(35)

_______________ is an authentication process by which the user can enter a single user ID and password then move from application to application or resource to resource without having to supply further authentication information.

(Short Answer)
4.8/5
(35)

What are the three types of accounting records in TACACS+?

(Multiple Choice)
4.9/5
(26)

TACACS+ is a client/server protocol that uses IP as its transport protocol.

(True/False)
4.9/5
(35)

Which of the following protocols involves a three-way handshake and uses a shared secret key for communication?

(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)