Which of the following authentication systems may be used with wireless technologies?
Upgrade to remove ads Show Only SGD 41.99/year
Terms in this set (35)Which of the following is the verification of a person's identity? A. Authorization Authentication Which of the following would fall into the category of "something a person is"? A.
Passwords Fingerprints Which of the following are good practices for tracking user identities? (Select the two best answers) A. Video cameras Video cameras What are two examples of common single sign-on authentication configurations? (Select the two best answers.) A. Biometrics-based Kerberos-based Which of the following is an example of two-factor authentication? A. L2TP and IPsec Thumbprint and key cards What is the main purpose of a physical access log? A. To enable authorized employee access To show who entered the facility Which of the following is not a common criteria when authenticating users? A. Something you do Something you like Of the following, what two authentication mechanisms require something you physically possess? (Select the two best answers.) A. Smart card Smart card Which of the following is the final step a user needs to take before that user can access domain resources? A. Verification Authorization To gain access to your network, users must provide a thumbprint and a username and password. What type of authentication model is this? A.
Biometrics Multifactor The IT director has asked you to set up an authentication model in which users can enter their credentials one time, yet still access multiple server resources. What type of authentication model should you implement? A. Smart card and biometrics SSO What types of technologies are used by external motion detectors? (Select the two best answers.) A. Infrared Infrared Which of the following results occurs when a biometric system identifies a legitimate user as unauthorized? A. False rejection False rejection Of the following, which is not a logical method of access control? A. Username/password Biometrics Your data center has highly critical information. Because of this you want to improve
upon physical security. The data center already has a video surveillance system. What else can you add to increase physical security? (Select the two best answers.) A mantrap Two items are needed before a user can be given access to the network. What are these two items? A. Authentication and
authorization Identification and authentication Which of the following best describes the proper method and reason to implement port security? A. Apply a security control that ties specific ports to end-device MAC addresses, and prevents additional devices from being connected to the
network. Apply a security control that ties specific ports to end-device MAC addresses, and prevents additional devices from being connected to the network. Which two options can prevent unauthorized employees from entering a server room? (Select the two best answers) A. Bollards Security guard
Before gaining access to the data center, you must swipe your finger on a device. What type of authentication is this? A. Biometrics Biometrics Your organization provides employee badges that are encoded with a private encryption key and specific personal information. The encoding is used to provide access to the organization's network. What type of authentication method is being used? A. Token Smart card Which of the following about authentication is false? A. RADIUS is a client-server system that provides authentication, authorization, and accounting services. MS-CHAPv2 is not capable of mutual authentication of the client and sever. In a secure environment, which authentication mechanism performs better? A. RADIUS because it is a remote access authentication service. TACACS+ because it encrypts client-server negotiation dialogues. Which port number does the protocol LDAP use when it is secured? A. 389 636 Which of the following permits or denies access to resources through the use of ports? A. Hub 802.1X Which authentication method completes the following in order: logon request, encrypts value response, server, challenge, compare encrypted results, and authorize or fail referred to? A. Security tokens
CHAP What does a virtual private network use to connect one remote host to another? A. Modem Internet Kerberos uses which of the following? (Select the two best answers.) A. Ticket distribution service Ticket distribution service Which of the following authentication systems makes use of a Key Distribution Center? A. Security tokens Kerberos Of the following, which best describes the difference between RADIUS and TACACS+? A. RADIUS is a remote access
authentication service. TACACS+ separates authentication, authorization, and auditing capabilities. You are tasked with setting up a wireless network that uses 802.11X for authentication. You set up the wireless network using WPA2 and CCMP; however, you don't want to use a PSK for authentication. Which of the following options would support 802.11X authentication? A. Kerberos RADIUS What is the most secure method of authentication and authorization in its default form? A. TACACS Kerberos When attempting to grant access to remote users, which protocol uses separate, multiple-challenge responses for each of the authentication, authorization, and audit processes? A. RADIUS TACACS+ Which of the following is an authentication system that uses UDP as the transport mechanism? A.
LDAP RADIUS You are in charge of training a group of technicians on the authentication method their organization uses. The organization currently runs an Active Directory infrastructure. Which of the following best correlates to the host authentication protocol used within that organization's IT environment? A. TACACS+ Kerberos Which of the following is an authentication and accounting service that uses TCP as its transport mechanism when connecting to routers and switches? A. Kerberos TACACS+ Sets with similar termsSecurity+ Ch.1035 terms LearaDobbins Security +95 terms fatherof4girls Chapter 920 terms kerrymccarter Quiz 1035 terms zeefountain Other sets by this creatorOperating Systems Final Exam128 terms residentevil35 Operating Systems Exam 215 terms residentevil35 Operating Systems Exam 168 terms residentevil35 Security + - Ch. 1 - Today's Security Professional27 terms residentevil35 Other Quizlet setsPSY 341 - Guide 167 terms mrandrewhoPLUS fina 481 investments wk 4 assignments15 terms heather_lampshire Psychology: Chapter 117 terms smashinator Chapter 3: SB 14864 terms Michelle_McIlwain Related questionsQUESTION When your system running Windows 7 is configured to receive a DHCP address, what happens when your system cannot contact a DHCP server? 12 answers QUESTION Which security principle states that if you have not specifically been allowed access, then it should be denied? 10 answers QUESTION You would like to get a feel for the amount of bandwidth you are using in your network. What is the first thing you should do? 10 answers QUESTION A cookie refers to which of these 15 answers What is the best authentication method for wireless?When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice.
What are the 4 authentication techniques?The most common authentication methods are Password Authentication Protocol (PAP), Authentication Token, Symmetric-Key Authentication, and Biometric Authentication.
Which authentication method is commonly used for more secure wireless networks?WiFi Protected Access: WPA / WPA2 / WPA3
This authentication method uses different encryption algorithms to encrypt the transport. Therefore, this type of network cannot be forged easily, unlike open networks, and users get privacy. Today, WPA2 is probably the most commonly used method to secure WiFi networks.
What types of authentication can be used for network access?Here are just a few of those methods.. Single-Factor/Primary Authentication. ... . Two-Factor Authentication (2FA) ... . Single Sign-On (SSO) ... . Multi-Factor Authentication (MFA) ... . Password Authentication Protocol (PAP) ... . Challenge Handshake Authentication Protocol (CHAP) ... . Extensible Authentication Protocol (EAP). |