Exam 11: Authentication and Remote Access
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects?
(Multiple Choice)
4.8/5
(35)
________ is the encapsulation of one packet within another.It allows you to hide the original packet from view.
(Short Answer)
4.8/5
(44)
Which of the following protocols involves a two-way handshake in which the username and password are sent across the link in clear text?
(Multiple Choice)
4.7/5
(35)
_______________ authentication is a term that describes the use of more than one authentication mechanism at the same time.
(Short Answer)
4.9/5
(26)
One of the fundamental design aspects of TACACS+ is the separation of authentication,authorization,and accounting.
(True/False)
4.9/5
(26)
The two protocols used in IPSec to provide traffic security are _________ and __________.
(Short Answer)
4.8/5
(28)
RADIUS is a remote authentication protocol the uses UDP port 1812.
(True/False)
4.9/5
(35)
Which of the following types of access control would you use to grant permissions based on the decision of the owner of an object?
(Multiple Choice)
4.7/5
(39)
The 802.1x standard is for a protocol to support communications between a user and a(n)
(Multiple Choice)
4.8/5
(37)
_______________ describes a process in which each side of an electronic communication verifies the authenticity of the other.
(Short Answer)
4.7/5
(26)
With IPsec,security associations are used to establish the logical set of security parameters designed to facilitate the sharing of information between entities.The security association protects
(Multiple Choice)
4.8/5
(37)
Which type of access control would allow the company to restrict employee access to the payroll file after hours or on weekends?
(Multiple Choice)
4.9/5
(34)
_______________ is the granting of specific permissions based on the privileges held by the account.
(Short Answer)
4.8/5
(35)
_______________ is an authentication process by which the user can enter a single user ID and password then move from application to application or resource to resource without having to supply further authentication information.
(Short Answer)
4.8/5
(35)
TACACS+ is a client/server protocol that uses IP as its transport protocol.
(True/False)
4.9/5
(35)
Which of the following protocols involves a three-way handshake and uses a shared secret key for communication?
(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 46
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)