Deck 11: Authentication and Remote Access

Full screen (f)
exit full mode
Question
The primary vulnerability associated with many methods of remote access is

A)Weak encryption
B)Too complicated for users to understand
C)The passing of critical data in clear text
D)Incompatibility with firewalls
Use Space or
up arrow
down arrow
to flip the card.
Question
With IPsec,security associations are used to establish the logical set of security parameters designed to facilitate the sharing of information between entities.The security association protects

A)Confidentiality
B)Integrity and confidentiality
C)Confidentiality and availability
D)Integrity and availability
Question
Your boss wants you to suggest a secure way to connect to the corporate network from home.You will have to connect through the Internet.What is a possible solution?

A)Telnet
B)FTP
C)VPN
D)rsh
Question
The 802.1x standard is for a protocol to support communications between a user and a(n)

A)Authorization device
B)Available device
C)Serial device
D)Another user
Question
RADIUS uses

A)TCP port 1812 for authentication and TCP port 1813 for accounting
B)TCP port 1812 for accounting and TCP port 1813 for authentication
C)UDP port 1812 for authentication and UDP port 1813 for accounting
D)UDP port 1812 for accounting and UDP port 1813 for authentication
Question
The three major components of the SSH protocol are the

A)Transport Layer Protocol,User Authentication Protocol,and Connection Protocol
B)User Datagram Protocol,User Authentication Protocol,and Connection Protocol
C)Transport Layer Protocol,User Encryption Protocol,and Connection Protocol
D)User Datagram Protocol,User Encryption Protocol,and Connection Protocol
Question
Which of the following protocols involves a two-way handshake in which the username and password are sent across the link in clear text?

A)PAP
B)SSH
C)EAP
D)CHAP
Question
L2TP uses

A)UDP port 1701
B)TCP port 1701
C)TCP port 1107
D)TCP port 1217
Question
TACACS+ uses

A)UDP port 49 and TCP port 50 for login
B)UDP port 49 and TCP port 49 for login
C)UDP port 49 and UDP port 50 for login
D)TCP port 49 and UDP port 50 for login
Question
What does TACACS stand for?

A)Terminal Access Control of Authentication and Control Systems
B)Terminal Access Controller Access Control System
C)Television Availability Control And Communication Standard
D)Teletype Authentication and Control of All Control Systems
Question
What does SSH stand for?

A)Simple Security Hardware
B)Secure Socket Help
C)Secure Shell
D)Scientifically Secure Hard Drive
Question
Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network?

A)PPPP
B)PPTP
C)PTPN
D)PPTN
Question
What protocol would you use for remote access,to get a console with an encrypted connection?

A)SSH
B)Telnet
C)FTP
D)STP
Question
Which of the following protocols involves a three-way handshake and uses a shared secret key for communication?

A)PAP
B)CHAP
C)TCP
D)S/Telnet
Question
In addition to "What users know," "What users have," and "What users are," what did the author add to be able to authenticate a user?

A)"What users should have"
B)"What users should think"
C)"What users can argue they should be"
D)"What users do"
Question
What does AAA stand for?

A)Awareness,Accounting,Available
B)Acceptable,Available,Activities
C)Acute,Awareness,Accounting
D)Authentication,Authorization,Accounting
Question
What does RADIUS stand for?

A)Real Access Device Invisible Users Solution
B)Rational Available Device Incremental Users Service
C)Remote Authentication Dial-In User Service
D)Remote Authentication Device Invisible Users Solution
Question
With IPsec,AH and ESP

A)Must be used together
B)Must be used separately
C)Can be used separately or together
D)Must be used with EAP
Question
What are the three types of accounting records in TACACS+?

A)Availability,Accounting,Confidentiality
B)Availability,Integrity,Confidentiality
C)Start,Stop,Update
D)Start,Stop,Delete
Question
Which of the following describes the wireless standard?

A)802.11
B)854.12
C)800.15
D)756.10
Question
Protecting the header information of a packet is referred to as _______________ protection.
Question
Authorization is the matching of user-supplied credentials to previously stored credentials on a host machine,and usually involves a username and password.
Question
Telnet traffic is encrypted by default.
Question
Authentication is the granting of specific permissions based on the privileges held by the account.
Question
Protecting only the data portion of a packet is referred to as _______________ protection.
Question
The two protocols used in IPSec to provide traffic security are _________ and __________.
Question
Which type of access control would be used to grant permissions based on the duties that must be performed?

A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
Question
One of the fundamental design aspects of TACACS+ is the separation of authentication,authorization,and accounting.
Question
A door that requires a thumbprint,key card,and password is an example of

A)Single sign-on
B)Mutual authentication
C)Multifactor authentication
D)Dual access control
Question
TACACS+ is a client/server protocol that uses IP as its transport protocol.
Question
Telnet is a secure way to remotely access a computer.
Question
Which type of access control would allow the company to restrict employee access to the payroll file after hours or on weekends?

A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
Question
Which of the following types of access control would you use to grant permissions based on the decision of the owner of an object?

A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
Question
RADIUS is a remote authentication protocol the uses UDP port 1812.
Question
In Kerberos environment,the first ticket in the two-step process is the ticket-granting ticket.
Question
Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects?

A)Mandatory access control
B)Discretionary Access Control
C)Role-based access control
D)Rule-based access control
Question
The main weakness of SSH is that all traffic is sent in the clear.
Question
________ is the encapsulation of one packet within another.It allows you to hide the original packet from view.
Question
With mandatory access controls,the owner of an object determines who has access to it.
Question
_______________ describes a process in which each side of an electronic communication verifies the authenticity of the other.
Question
_______________ is the matching of user-supplied credentials to previously stored credentials on a host machine.
Question
_______________ authentication is a term that describes the use of more than one authentication mechanism at the same time.
Question
_______________ is the granting of specific permissions based on the privileges held by the account.
Question
_______________ is an authentication process by which the user can enter a single user ID and password then move from application to application or resource to resource without having to supply further authentication information.
Question
What are the three steps of establishing proper privileges?
Question
_______________ is the collection of billing and other detail records.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/46
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Authentication and Remote Access
1
The primary vulnerability associated with many methods of remote access is

A)Weak encryption
B)Too complicated for users to understand
C)The passing of critical data in clear text
D)Incompatibility with firewalls
C
2
With IPsec,security associations are used to establish the logical set of security parameters designed to facilitate the sharing of information between entities.The security association protects

A)Confidentiality
B)Integrity and confidentiality
C)Confidentiality and availability
D)Integrity and availability
B
3
Your boss wants you to suggest a secure way to connect to the corporate network from home.You will have to connect through the Internet.What is a possible solution?

A)Telnet
B)FTP
C)VPN
D)rsh
C
4
The 802.1x standard is for a protocol to support communications between a user and a(n)

A)Authorization device
B)Available device
C)Serial device
D)Another user
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
5
RADIUS uses

A)TCP port 1812 for authentication and TCP port 1813 for accounting
B)TCP port 1812 for accounting and TCP port 1813 for authentication
C)UDP port 1812 for authentication and UDP port 1813 for accounting
D)UDP port 1812 for accounting and UDP port 1813 for authentication
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
6
The three major components of the SSH protocol are the

A)Transport Layer Protocol,User Authentication Protocol,and Connection Protocol
B)User Datagram Protocol,User Authentication Protocol,and Connection Protocol
C)Transport Layer Protocol,User Encryption Protocol,and Connection Protocol
D)User Datagram Protocol,User Encryption Protocol,and Connection Protocol
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following protocols involves a two-way handshake in which the username and password are sent across the link in clear text?

A)PAP
B)SSH
C)EAP
D)CHAP
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
8
L2TP uses

A)UDP port 1701
B)TCP port 1701
C)TCP port 1107
D)TCP port 1217
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
9
TACACS+ uses

A)UDP port 49 and TCP port 50 for login
B)UDP port 49 and TCP port 49 for login
C)UDP port 49 and UDP port 50 for login
D)TCP port 49 and UDP port 50 for login
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
10
What does TACACS stand for?

A)Terminal Access Control of Authentication and Control Systems
B)Terminal Access Controller Access Control System
C)Television Availability Control And Communication Standard
D)Teletype Authentication and Control of All Control Systems
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
11
What does SSH stand for?

A)Simple Security Hardware
B)Secure Socket Help
C)Secure Shell
D)Scientifically Secure Hard Drive
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
12
Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network?

A)PPPP
B)PPTP
C)PTPN
D)PPTN
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
13
What protocol would you use for remote access,to get a console with an encrypted connection?

A)SSH
B)Telnet
C)FTP
D)STP
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following protocols involves a three-way handshake and uses a shared secret key for communication?

A)PAP
B)CHAP
C)TCP
D)S/Telnet
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
15
In addition to "What users know," "What users have," and "What users are," what did the author add to be able to authenticate a user?

A)"What users should have"
B)"What users should think"
C)"What users can argue they should be"
D)"What users do"
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
16
What does AAA stand for?

A)Awareness,Accounting,Available
B)Acceptable,Available,Activities
C)Acute,Awareness,Accounting
D)Authentication,Authorization,Accounting
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
17
What does RADIUS stand for?

A)Real Access Device Invisible Users Solution
B)Rational Available Device Incremental Users Service
C)Remote Authentication Dial-In User Service
D)Remote Authentication Device Invisible Users Solution
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
18
With IPsec,AH and ESP

A)Must be used together
B)Must be used separately
C)Can be used separately or together
D)Must be used with EAP
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
19
What are the three types of accounting records in TACACS+?

A)Availability,Accounting,Confidentiality
B)Availability,Integrity,Confidentiality
C)Start,Stop,Update
D)Start,Stop,Delete
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following describes the wireless standard?

A)802.11
B)854.12
C)800.15
D)756.10
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
21
Protecting the header information of a packet is referred to as _______________ protection.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
22
Authorization is the matching of user-supplied credentials to previously stored credentials on a host machine,and usually involves a username and password.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
23
Telnet traffic is encrypted by default.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
24
Authentication is the granting of specific permissions based on the privileges held by the account.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
25
Protecting only the data portion of a packet is referred to as _______________ protection.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
26
The two protocols used in IPSec to provide traffic security are _________ and __________.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
27
Which type of access control would be used to grant permissions based on the duties that must be performed?

A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
28
One of the fundamental design aspects of TACACS+ is the separation of authentication,authorization,and accounting.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
29
A door that requires a thumbprint,key card,and password is an example of

A)Single sign-on
B)Mutual authentication
C)Multifactor authentication
D)Dual access control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
30
TACACS+ is a client/server protocol that uses IP as its transport protocol.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
31
Telnet is a secure way to remotely access a computer.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
32
Which type of access control would allow the company to restrict employee access to the payroll file after hours or on weekends?

A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following types of access control would you use to grant permissions based on the decision of the owner of an object?

A)Mandatory access control
B)Discretionary access control
C)Role-based access control
D)Rule-based access control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
34
RADIUS is a remote authentication protocol the uses UDP port 1812.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
35
In Kerberos environment,the first ticket in the two-step process is the ticket-granting ticket.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
36
Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects?

A)Mandatory access control
B)Discretionary Access Control
C)Role-based access control
D)Rule-based access control
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
37
The main weakness of SSH is that all traffic is sent in the clear.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
38
________ is the encapsulation of one packet within another.It allows you to hide the original packet from view.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
39
With mandatory access controls,the owner of an object determines who has access to it.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
40
_______________ describes a process in which each side of an electronic communication verifies the authenticity of the other.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
41
_______________ is the matching of user-supplied credentials to previously stored credentials on a host machine.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
42
_______________ authentication is a term that describes the use of more than one authentication mechanism at the same time.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
43
_______________ is the granting of specific permissions based on the privileges held by the account.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
44
_______________ is an authentication process by which the user can enter a single user ID and password then move from application to application or resource to resource without having to supply further authentication information.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
45
What are the three steps of establishing proper privileges?
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
46
_______________ is the collection of billing and other detail records.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 46 flashcards in this deck.