Means that each employee with network access must log in using a unique password quizlet

Upgrade to remove ads

Show

    Only ₩37,125/year

    1. Other
    2. Computer Skills

    • Flashcards

    • Learn

    • Test

    • Match

    • Flashcards

    • Learn

    • Test

    • Match

    Terms in this set (33)

    Before accessing computer systems, a government agency requires users to swipe a card through a keyboard-embedded card reader and then provide a PIN. What is this an example of?

    Multifactor authentication

    Your traveling users require secure remote access to corporate database servers.
    What should you configure for them?

    VPN

    You are the network administrator for a national marketing firm. Employees have frequent lengthy telephone conference calls with colleagues from around the country. To reduce costs, you have been asked to recommend replacement telephony solutions. Which of the following might you suggest?

    VoIP

    You are an IT consultant auditing a network. During your presentation of audit findings, one of your clients asks what can be used to prevent unauthorized LAN access. How do you answer the question?

    NAC

    What type of server authenticates users prior to allowing network access?

    RADIUS

    Which of the following are examples of RADIUS clients? (Choose two.)

    - 802.1x-capable switch
    - Wireless router

    Which of the following are true regarding TACACS+? (Choose three.)

    - It is a Cisco proprietary protocol
    - It can be used as an alternative to RADIUS
    - TACACS+ uses TCP

    You are the network administrator for a UNIX network. You are planning your network security. A secure protocol must be chosen to authenticate all users logging in. Which is a valid authentication protocol choice?

    Kerberos

    A client asks you to evaluate the feasibility of a Linux client and server operating system environment. The primary concern is having a central database of user and computer accounts capable of secure authentication. What Linux options should you explore?

    LDAP

    You are configuring a Cisco network authentication appliance. During configuration, you are given a list of authentication choices. Which choice provides the best security and reliability?

    TACACS+

    A user enters her logon name to gain network access. To which of the following terms would the example apply?

    Identification

    A user enters a logon name and password to gain network access. Choose the best description in which this applies.

    Single-factor authentication

    A corporation has invested heavily in the development of a much sought-after product. To prove its investment, the company would like to ensure that only specific personnel can enter a research facility. Which of the following is considered the most secure?

    Retinal scanner

    Which of the following is considered three-factor authentication?

    Username/password/smartcard/PIN

    To log on to a secured system, a user must enter a username, password, and passcode. The passcode is generated from a tiny handheld device and displayed on a tiny screen. What type of device is this?

    Key fob

    Which of the following prevents users from having to specify logon credentials when accessing multiple applications?

    Single sign-on

    Which authentication protocol replaces RADIUS?

    Diameter

    Which of the following best describes CHAP?

    Passwords are never sent over the network

    You are configuring a WPA2 wireless network connection on a company laptop. The company has implemented a PKI. Which WPA2 network authentication method would be the best choice?

    Local computer certificate

    Which of the following examples best illustrates authentication?

    A computer successfully identifies itself to a server prior to user logon

    A technician is troubleshooting user access to an 802.1x wireless network called CORP. The same computer was previously given an IP address on the 10.17.7.0/24 network, but now for some reason it has an IP address on the 10.16.16.0/24 network. DHCP is functioning correctly on the network. The technician reports the machine was recently reimaged, and the image uses DHCP. What is the most likely cause of the problem?

    The workstation needs to have its PKI certificate reinstalled

    What type of security problems would network access control (NAC) best address?

    ARP cache poisoning

    A company intranet consists of various internal web servers each using different authentication stores. What would allow users to use the same username and password for all internal web use?

    SSO

    While capturing network traffic, you notice clear-text credentials being transmitted. After investigating the TCP headers, you notice the destination port is 389. What type of authentication traffic is this?

    LDAP

    You are evaluating public cloud storage solutions. Users will be authenticated to a local server as your network that will allow them access to cloud storage. Which identify federation standard could be configured to achieve this?

    SAML

    As the network administrator, you are asked to configure a secure VPN solution that uses MFA. Which of the following solutions should you recommend?

    - Key fob and password
    - Smartcard and password

    You have been hired by a university to recommend IT solutions. Currently, students and faculty use proximity cards to access buildings on campus after hours, and they have usernames and passwords to log on to lab computers. The university would like to use PKI information unique to each user to allow access to campus buildings and to log on to workstations in labs. What should you recommend?

    Common access card

    Android-based smart phones have been distributed to traveling employees for use with Google online services. You deploy the Google Authenticator app to the smart phones to allow user authentication based on the time as well as a unique code generated by the server. What type of authentication is this?

    Time-based one-time password

    Your router ACL is as follows:

    ip access-group 55 out
    access-list 55 permit host 199.126.129.8
    access-list 55 permit host 199.126.129.9

    A workstation, PC1, with an IP address of 199.126.129.10 attempts to access a remote network and is prevented from doing so. Which statement accurately describes this scenario?

    PC1 was implicitly denied access to the remote network.

    Which of the following authentication methods is based on something you do?

    Handwriting

    You are the Microsoft Active Directory administrator for an American government agency. The Active Directory domain in Los Angeles is configured to trust the Active Directory domain in Chicago, which in turn trusts the Active Directory domain in Orlando. Which term correctly describes the trust relationship between Los Angeles and Orlando?

    Transitive trust

    Which of the following are authentication/authorization frameworks? (Choose all that apply.)

    - OpenID Connect
    - OAUTH
    - Shibboleth

    Security approaches you at work about people sometimes being able to enter the office using their voice recognition system even though they are not employees. What is the problem?

    False acceptance

    Students also viewed

    Chapter 11: Access Control

    45 terms

    ernesto_perez

    3.6

    54 terms

    aMax2017

    Ch. 16

    34 terms

    aric_siegrist1

    5584 cpt 11

    32 terms

    fdh29891114

    Sets found in the same folder

    CH 11

    34 terms

    mbusty

    CH 12

    40 terms

    mbusty

    CH 13

    26 terms

    mbusty

    Verified questions

    other

    Today, we use a process of heating liquids to prevent spoiling by bacteria and other microorganisms, pioneered by of the three scientists mentioned above. What is that process called and for what food is it used?

    Verified answer

    other

    You have a pick up truck and want to haul a load of trash or garbage in the back you must do what

    Verified answer

    other

    Determine the overall length, width, and height of the casting in Figure 2-4. All dimensions are in inches.

    Verified answer

    other

    Abrasives are used by cabinetmakers to ___ surfaces in preparation for assembly of finishing.

    Verified answer

    Other Quizlet sets

    history progressive pt.2 10/25/18

    27 terms

    Abby_Coath06

    Physics Wave Test

    19 terms

    anabelleadams

    Computer Science Test 1

    31 terms

    haidentaylor

    Keystone Exam SG Stuff to Study

    57 terms

    allykap