Upgrade to remove ads Show Only ₩37,125/year
Terms in this set (33)Before accessing computer systems, a government agency requires users to swipe a card through a keyboard-embedded card reader and then provide a PIN. What is this an example of? Multifactor authentication Your traveling users require secure remote
access to corporate database servers. VPN You are the network administrator for a national marketing firm. Employees have frequent lengthy telephone conference calls with colleagues from around the country. To reduce costs, you have been asked to recommend replacement telephony solutions. Which of the following might you suggest? VoIP You are an IT consultant auditing a network. During your presentation of audit findings, one of your clients asks what can be used to prevent unauthorized LAN access. How do you answer the question? NAC What type of server authenticates users prior to allowing network access? RADIUS Which of the following are examples of RADIUS clients? (Choose two.) - 802.1x-capable switch Which of the following are true regarding TACACS+? (Choose three.) - It is a Cisco proprietary protocol You are the network administrator for a UNIX network. You are planning your network security. A secure protocol must be chosen to authenticate all users logging in. Which is a valid authentication protocol choice? Kerberos A client asks you to evaluate the feasibility of a Linux client and server operating system environment. The primary concern is having a central database of user and computer accounts capable of secure authentication. What Linux options should you explore? LDAP You are configuring a Cisco network authentication appliance. During configuration, you are given a list of authentication choices. Which choice provides the best security and reliability? TACACS+ A user enters her logon name to gain network access. To which of the following terms would the example apply? Identification A user enters a logon name and password to gain network access. Choose the best description in which this applies. Single-factor authentication A corporation has invested heavily in the development of a much sought-after product. To prove its investment, the company would like to ensure that only specific personnel can enter a research facility. Which of the following is considered the most secure? Retinal scanner Which of the following is considered three-factor authentication? Username/password/smartcard/PIN To log on to a secured system, a user must enter a username, password, and passcode. The passcode is generated from a tiny handheld device and displayed on a tiny screen. What type of device is this? Key fob Which of the following prevents users from having to specify logon credentials when accessing multiple applications? Single sign-on Which authentication protocol replaces RADIUS? Diameter Which of the following best describes CHAP? Passwords are never sent over the network You are configuring a WPA2 wireless network connection on a company laptop. The company has implemented a PKI. Which WPA2 network authentication method would be the best choice? Local computer certificate Which of the following examples best illustrates authentication? A computer successfully identifies itself to a server prior to user logon A technician is troubleshooting user access to an 802.1x wireless network called CORP. The same computer was previously given an IP address on the 10.17.7.0/24 network, but now for some reason it has an IP address on the 10.16.16.0/24 network. DHCP is functioning correctly on the network. The technician reports the machine was recently reimaged, and the image uses DHCP. What is the most likely cause of the problem? The workstation needs to have its PKI certificate reinstalled What type of security problems would network access control (NAC) best address? ARP cache poisoning A company intranet consists of various internal web servers each using different authentication stores. What would allow users to use the same username and password for all internal web use? SSO While capturing network traffic, you notice clear-text credentials being transmitted. After investigating the TCP headers, you notice the destination port is 389. What type of authentication traffic is this? LDAP You are evaluating public cloud storage solutions. Users will be authenticated to a local server as your network that will allow them access to cloud storage. Which identify federation standard could be configured to achieve this? SAML As the network administrator, you are asked to configure a secure VPN solution that uses MFA. Which of the following solutions should you recommend? - Key fob and password You have been hired by a university to recommend IT solutions. Currently, students and faculty use proximity cards to access buildings on campus after hours, and they have usernames and passwords to log on to lab computers. The university would like to use PKI information unique to each user to allow access to campus buildings and to log on to workstations in labs. What should you recommend? Common access card Android-based smart phones have been distributed to traveling employees for use with Google online services. You deploy the Google Authenticator app to the smart phones to allow user authentication based on the time as well as a unique code generated by the server. What type of authentication is this? Time-based one-time password Your router ACL is as follows: ip access-group 55 out A workstation, PC1, with an IP address of 199.126.129.10 attempts to access a remote network and is prevented from doing so. Which statement accurately describes this scenario? PC1 was implicitly denied access to the remote network. Which of the following authentication methods is based on something you do? Handwriting You are the Microsoft Active Directory administrator for an American government agency. The Active Directory domain in Los Angeles is configured to trust the Active Directory domain in Chicago, which in turn trusts the Active Directory domain in Orlando. Which term correctly describes the trust relationship between Los Angeles and Orlando? Transitive trust Which of the following are authentication/authorization frameworks? (Choose all that apply.) - OpenID Connect Security approaches you at work about people sometimes being able to enter the office using their voice recognition system even though they are not employees. What is the problem? False acceptance Students also viewedChapter 11: Access Control45 terms ernesto_perez 3.654 terms aMax2017 Ch. 1634 terms aric_siegrist1 5584 cpt 1132 terms fdh29891114 Sets found in the same folderCH 1134 terms mbusty CH 1240 terms mbusty CH 1326 terms mbusty Verified questionsother Today, we use a process of heating liquids to prevent spoiling by bacteria and other microorganisms, pioneered by of the three scientists mentioned above. What is that process called and for what food is it used? Verified answer
other You have a pick up truck and want to haul a load of trash or garbage in the back you must do what Verified answer
other Determine the overall length, width, and height of the casting in Figure 2-4. All dimensions are in inches. Verified answer other Abrasives are used by cabinetmakers to ___ surfaces in preparation for assembly of finishing. Verified answer Other Quizlet setshistory progressive pt.2 10/25/1827 terms Abby_Coath06 Physics Wave Test19 terms anabelleadams Computer Science Test 131 terms haidentaylor Keystone Exam SG Stuff to Study57 terms allykap |