Deck 11: Authentication and Remote Access
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/46
Play
Full screen (f)
Deck 11: Authentication and Remote Access
1
The primary vulnerability associated with many methods of remote access is
A)Weak encryption
B)Too complicated for users to understand
C)The passing of critical data in clear text
D)Incompatibility with firewalls
A)Weak encryption
B)Too complicated for users to understand
C)The passing of critical data in clear text
D)Incompatibility with firewalls
C
2
With IPsec,security associations are used to establish the logical set of security parameters designed to facilitate the sharing of information between entities.The security association protects
A)Confidentiality
B)Integrity and confidentiality
C)Confidentiality and availability
D)Integrity and availability
A)Confidentiality
B)Integrity and confidentiality
C)Confidentiality and availability
D)Integrity and availability
B
3
Your boss wants you to suggest a secure way to connect to the corporate network from home.You will have to connect through the Internet.What is a possible solution?
A)Telnet
B)FTP
C)VPN
D)rsh
A)Telnet
B)FTP
C)VPN
D)rsh
C
4
The 802.1x standard is for a protocol to support communications between a user and a(n)
A)Authorization device
B)Available device
C)Serial device
D)Another user
A)Authorization device
B)Available device
C)Serial device
D)Another user
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
5
RADIUS uses
A)TCP port 1812 for authentication and TCP port 1813 for accounting
B)TCP port 1812 for accounting and TCP port 1813 for authentication
C)UDP port 1812 for authentication and UDP port 1813 for accounting
D)UDP port 1812 for accounting and UDP port 1813 for authentication
A)TCP port 1812 for authentication and TCP port 1813 for accounting
B)TCP port 1812 for accounting and TCP port 1813 for authentication
C)UDP port 1812 for authentication and UDP port 1813 for accounting
D)UDP port 1812 for accounting and UDP port 1813 for authentication
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
6
The three major components of the SSH protocol are the
A)Transport Layer Protocol,User Authentication Protocol,and Connection Protocol
B)User Datagram Protocol,User Authentication Protocol,and Connection Protocol
C)Transport Layer Protocol,User Encryption Protocol,and Connection Protocol
D)User Datagram Protocol,User Encryption Protocol,and Connection Protocol
A)Transport Layer Protocol,User Authentication Protocol,and Connection Protocol
B)User Datagram Protocol,User Authentication Protocol,and Connection Protocol
C)Transport Layer Protocol,User Encryption Protocol,and Connection Protocol
D)User Datagram Protocol,User Encryption Protocol,and Connection Protocol
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following protocols involves a two-way handshake in which the username and password are sent across the link in clear text?
A)PAP
B)SSH
C)EAP
D)CHAP
A)PAP
B)SSH
C)EAP
D)CHAP
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
8
L2TP uses
A)UDP port 1701
B)TCP port 1701
C)TCP port 1107
D)TCP port 1217
A)UDP port 1701
B)TCP port 1701
C)TCP port 1107
D)TCP port 1217
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
9
TACACS+ uses
A)UDP port 49 and TCP port 50 for login
B)UDP port 49 and TCP port 49 for login
C)UDP port 49 and UDP port 50 for login
D)TCP port 49 and UDP port 50 for login
A)UDP port 49 and TCP port 50 for login
B)UDP port 49 and TCP port 49 for login
C)UDP port 49 and UDP port 50 for login
D)TCP port 49 and UDP port 50 for login
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
10
What does TACACS stand for?
A)Terminal Access Control of Authentication and Control Systems
B)Terminal Access Controller Access Control System
C)Television Availability Control And Communication Standard
D)Teletype Authentication and Control of All Control Systems
A)Terminal Access Control of Authentication and Control Systems
B)Terminal Access Controller Access Control System
C)Television Availability Control And Communication Standard
D)Teletype Authentication and Control of All Control Systems
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
11
What does SSH stand for?
A)Simple Security Hardware
B)Secure Socket Help
C)Secure Shell
D)Scientifically Secure Hard Drive
A)Simple Security Hardware
B)Secure Socket Help
C)Secure Shell
D)Scientifically Secure Hard Drive
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
12
Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network?
A)PPPP
B)PPTP
C)PTPN
D)PPTN
A)PPPP
B)PPTP
C)PTPN
D)PPTN
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
13
What protocol would you use for remote access,to get a console with an encrypted connection?
A)SSH
B)Telnet
C)FTP
D)STP
A)SSH
B)Telnet
C)FTP
D)STP
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following protocols involves a three-way handshake and uses a shared secret key for communication?
A)PAP
B)CHAP
C)TCP
D)S/Telnet
A)PAP
B)CHAP
C)TCP
D)S/Telnet
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
15
In addition to "What users know," "What users have," and "What users are," what did the author add to be able to authenticate a user?
A)"What users should have"
B)"What users should think"
C)"What users can argue they should be"
D)"What users do"
A)"What users should have"
B)"What users should think"
C)"What users can argue they should be"
D)"What users do"
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
16
What does AAA stand for?
A)Awareness,Accounting,Available
B)Acceptable,Available,Activities
C)Acute,Awareness,Accounting
D)Authentication,Authorization,Accounting
A)Awareness,Accounting,Available
B)Acceptable,Available,Activities
C)Acute,Awareness,Accounting
D)Authentication,Authorization,Accounting
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
17
What does RADIUS stand for?
A)Real Access Device Invisible Users Solution
B)Rational Available Device Incremental Users Service
C)Remote Authentication Dial-In User Service
D)Remote Authentication Device Invisible Users Solution
A)Real Access Device Invisible Users Solution
B)Rational Available Device Incremental Users Service
C)Remote Authentication Dial-In User Service
D)Remote Authentication Device Invisible Users Solution
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
18
With IPsec,AH and ESP
A)Must be used together
B)Must be used separately
C)Can be used separately or together
D)Must be used with EAP
A)Must be used together
B)Must be used separately
C)Can be used separately or together
D)Must be used with EAP
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
19
What are the three types of accounting records in TACACS+?
A)Availability,Accounting,Confidentiality
B)Availability,Integrity,Confidentiality
C)Start,Stop,Update
D)Start,Stop,Delete
A)Availability,Accounting,Confidentiality
B)Availability,Integrity,Confidentiality
C)Start,Stop,Update
D)Start,Stop,Delete
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following describes the wireless standard?
A)802.11
B)854.12
C)800.15
D)756.10
A)802.11
B)854.12
C)800.15
D)756.10
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
21
Protecting the header information of a packet is referred to as _______________ protection.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
22
Authorization is the matching of user-supplied credentials to previously stored credentials on a host machine,and usually involves a username and password.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
23
Telnet traffic is encrypted by default.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
24
Authentication is the granting of specific permissions based on the privileges held by the account.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
25
Protecting only the data portion of a packet is referred to as _______________ protection.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
26
The two protocols used in IPSec to provide traffic security are _________ and __________.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
27
Which type of access control would be used to grant permissions based on the duties that must be performed?
A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
28
One of the fundamental design aspects of TACACS+ is the separation of authentication,authorization,and accounting.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
29
A door that requires a thumbprint,key card,and password is an example of
A)Single sign-on
B)Mutual authentication
C)Multifactor authentication
D)Dual access control
A)Single sign-on
B)Mutual authentication
C)Multifactor authentication
D)Dual access control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
30
TACACS+ is a client/server protocol that uses IP as its transport protocol.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
31
Telnet is a secure way to remotely access a computer.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
32
Which type of access control would allow the company to restrict employee access to the payroll file after hours or on weekends?
A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following types of access control would you use to grant permissions based on the decision of the owner of an object?
A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
34
RADIUS is a remote authentication protocol the uses UDP port 1812.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
35
In Kerberos environment,the first ticket in the two-step process is the ticket-granting ticket.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
36
Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects?
A)Mandatory access control
B)Discretionary Access Control
C)Role-based access control
D)Rule-based access control
A)Mandatory access control
B)Discretionary Access Control
C)Role-based access control
D)Rule-based access control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
37
The main weakness of SSH is that all traffic is sent in the clear.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
38
________ is the encapsulation of one packet within another.It allows you to hide the original packet from view.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
39
With mandatory access controls,the owner of an object determines who has access to it.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
40
_______________ describes a process in which each side of an electronic communication verifies the authenticity of the other.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
41
_______________ is the matching of user-supplied credentials to previously stored credentials on a host machine.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
42
_______________ authentication is a term that describes the use of more than one authentication mechanism at the same time.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
43
_______________ is the granting of specific permissions based on the privileges held by the account.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
44
_______________ is an authentication process by which the user can enter a single user ID and password then move from application to application or resource to resource without having to supply further authentication information.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
45
What are the three steps of establishing proper privileges?
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
46
_______________ is the collection of billing and other detail records.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck