Which of the following authentication systems may be used with wireless technologies?

Upgrade to remove ads

Only SGD 41.99/year

  1. Other
  2. Computer Skills

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (35)

Which of the following is the verification of a person's identity?

A. Authorization
B. Accountability
C. Authentication
D. Password

Authentication

Which of the following would fall into the category of "something a person is"?

A. Passwords
B. Passphrases
C. Fingerprints
D. Smart cards

Fingerprints

Which of the following are good practices for tracking user identities? (Select the two best answers)

A. Video cameras
B. Key card door access systems
C. Sign-in sheets
D. Security guards

Video cameras
Key card door access systems

What are two examples of common single sign-on authentication configurations? (Select the two best answers.)

A. Biometrics-based
B. Multifactor authentication
C. Kerberos-based
D. Smart card-based

Kerberos-based
Smart card-based

Which of the following is an example of two-factor authentication?

A. L2TP and IPsec
B. Username and password
C. Thumbprint and key card
D. Client and server

Thumbprint and key cards

What is the main purpose of a physical access log?

A. To enable authorized employee access
B. To show who exited the facility
C. To show who entered the facility
D. To prevent unauthorized employee access

To show who entered the facility

Which of the following is not a common criteria when authenticating users?

A. Something you do
B. Something you are
C. Something you know
D. Something you like

Something you like

Of the following, what two authentication mechanisms require something you physically possess? (Select the two best answers.)

A. Smart card
B. Certificate
C. USB flash drive
D. Username and password

Smart card
USB flash drive

Which of the following is the final step a user needs to take before that user can access domain resources?

A. Verification
B. Validation
C. Authorization
D. Authentication

Authorization

To gain access to your network, users must provide a thumbprint and a username and password. What type of authentication model is this?

A. Biometrics
B. Domain logon
C. Multifactor
D. Single sign-on

Multifactor

The IT director has asked you to set up an authentication model in which users can enter their credentials one time, yet still access multiple server resources. What type of authentication model should you implement?

A. Smart card and biometrics
B. Three-factor authentication
C. SSO
D. VPN

SSO

What types of technologies are used by external motion detectors? (Select the two best answers.)

A. Infrared
B. RFID
C. Gamma rays
D. Ultrasonic

Infrared
Ultrasonic

Which of the following results occurs when a biometric system identifies a legitimate user as unauthorized?

A. False rejection
B. FAR
C. False acceptance
D. CER
E. False exception

False rejection

Of the following, which is not a logical method of access control?

A. Username/password
B. Access control lists
C. Biometrics
D. Software-based policy

Biometrics

Your data center has highly critical information. Because of this you want to improve upon physical security. The data center already has a video surveillance system. What else can you add to increase physical security? (Select the two best answers.)
A. A software-based token system
B. Access control lists
C. A mantrap
D. Biometrics

A mantrap
Biometrics

Two items are needed before a user can be given access to the network. What are these two items?

A. Authentication and authorization
B. Authorization and identification
C. Identification and authentication
D. Password and authentication

Identification and authentication

Which of the following best describes the proper method and reason to implement port security?

A. Apply a security control that ties specific ports to end-device MAC addresses, and prevents additional devices from being connected to the network.
B. Apple a security control that ties specific ports to end-devices IP addresses, and prevents additional devices from being connected to the network.
C. Apple a security control that ties specific ports to end-device MAC addresses, and prevents all devices from being connected to the network.
D. Apply a security control that ties specific ports to end-device IP addresses, and prevents all devices from being connected to the network.

Apply a security control that ties specific ports to end-device MAC addresses, and prevents additional devices from being connected to the network.

Which two options can prevent unauthorized employees from entering a server room? (Select the two best answers)

A. Bollards
B. CCTV
C. Security guard
D. 802.1X
E. Proximity reader

Security guard
Proximity reader

Before gaining access to the data center, you must swipe your finger on a device. What type of authentication is this?

A. Biometrics
B. Single sign-on
C. Multifactor
D. Tokens

Biometrics

Your organization provides employee badges that are encoded with a private encryption key and specific personal information. The encoding is used to provide access to the organization's network. What type of authentication method is being used?

A. Token
B. Biometrics
C. Kerberos
D. Smart card

Smart card

Which of the following about authentication is false?

A. RADIUS is a client-server system that provides authentication, authorization, and accounting services.
B. PAP is insecure because usernames and passwords are sent as clear text.
C. MS-CHAPv2 is not capable of mutual authentication of the client and sever.
D. CHAP is more secure than PAP because it encrypts usernames and passwords.

MS-CHAPv2 is not capable of mutual authentication of the client and sever.

In a secure environment, which authentication mechanism performs better?

A. RADIUS because it is a remote access authentication service.
B. RADIUS because it encrypts client-server passwords.
C. TACACS+ because it is a remote access authentication service.
D. TACACS+ because it encrypts client-server negotiation dialogues.

TACACS+ because it encrypts client-server negotiation dialogues.

Which port number does the protocol LDAP use when it is secured?

A. 389
B. 443
C. 636
D. 3389

636

Which of the following permits or denies access to resources through the use of ports?

A. Hub
B. 802.11n
C. 802.11x
D. 802.1X

802.1X

Which authentication method completes the following in order: logon request, encrypts value response, server, challenge, compare encrypted results, and authorize or fail referred to?

A. Security tokens
B. Certificates
C. Kerberos
D. CHAP

CHAP

What does a virtual private network use to connect one remote host to another?

A. Modem
B. Network adapter
C. Internet
D. Cell phone

Internet

Kerberos uses which of the following? (Select the two best answers.)

A. Ticket distribution service
B. The Faraday cage
C. Port 389
D. Authentication service

Ticket distribution service
Authentication service

Which of the following authentication systems makes use of a Key Distribution Center?

A. Security tokens
B. CHAP
C. Kerberos
D. Certificates

Kerberos

Of the following, which best describes the difference between RADIUS and TACACS+?

A. RADIUS is a remote access authentication service.
B. RAIDUS separates authenticates, authorization, and auditing capabilities.
C. TACACS+ is a remote access authentication service.
D. TACACS+ separates authentication, authorization, and auditing capabilities.

TACACS+ separates authentication, authorization, and auditing capabilities.

You are tasked with setting up a wireless network that uses 802.11X for authentication. You set up the wireless network using WPA2 and CCMP; however, you don't want to use a PSK for authentication. Which of the following options would support 802.11X authentication?

A. Kerberos
B. CAC card
C. Pre-shared key
D. RADIUS

RADIUS

What is the most secure method of authentication and authorization in its default form?

A. TACACS
B. Kerberos
C. RADIUS
D. LDAP

Kerberos

When attempting to grant access to remote users, which protocol uses separate, multiple-challenge responses for each of the authentication, authorization, and audit processes?

A. RADIUS
B. TACACS
C. TACACS+
D. LDAP

TACACS+

Which of the following is an authentication system that uses UDP as the transport mechanism?

A. LDAP
B. Kerberos
C. RADIUS
D. TACACS+

RADIUS

You are in charge of training a group of technicians on the authentication method their organization uses. The organization currently runs an Active Directory infrastructure. Which of the following best correlates to the host authentication protocol used within that organization's IT environment?

A. TACACS+
B. Kerberos
C. LDAP
D. 802.1X

Kerberos

Which of the following is an authentication and accounting service that uses TCP as its transport mechanism when connecting to routers and switches?

A. Kerberos
B. RADIUS
C. Captive portal
D. TACACS+

TACACS+

Sets with similar terms

Security+ Ch.10

35 terms

LearaDobbins

Security +

95 terms

fatherof4girls

Chapter 9

20 terms

kerrymccarter

Quiz 10

35 terms

zeefountain

Other sets by this creator

Operating Systems Final Exam

128 terms

residentevil35

Operating Systems Exam 2

15 terms

residentevil35

Operating Systems Exam 1

68 terms

residentevil35

Security + - Ch. 1 - Today's Security Professional

27 terms

residentevil35

Other Quizlet sets

PSY 341 - Guide 1

67 terms

mrandrewhoPLUS

fina 481 investments wk 4 assignments

15 terms

heather_lampshire

Psychology: Chapter 1

17 terms

smashinator

Chapter 3: SB 148

64 terms

Michelle_McIlwain

Related questions

QUESTION

When your system running Windows 7 is configured to receive a DHCP address, what happens when your system cannot contact a DHCP server?

12 answers

QUESTION

Which security principle states that if you have not specifically been allowed access, then it should be denied?

10 answers

QUESTION

You would like to get a feel for the amount of bandwidth you are using in your network. What is the first thing you should do?

10 answers

QUESTION

A cookie refers to which of these

15 answers

What is the best authentication method for wireless?

When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice.

What are the 4 authentication techniques?

The most common authentication methods are Password Authentication Protocol (PAP), Authentication Token, Symmetric-Key Authentication, and Biometric Authentication.

Which authentication method is commonly used for more secure wireless networks?

WiFi Protected Access: WPA / WPA2 / WPA3 This authentication method uses different encryption algorithms to encrypt the transport. Therefore, this type of network cannot be forged easily, unlike open networks, and users get privacy. Today, WPA2 is probably the most commonly used method to secure WiFi networks.

What types of authentication can be used for network access?

Here are just a few of those methods..
Single-Factor/Primary Authentication. ... .
Two-Factor Authentication (2FA) ... .
Single Sign-On (SSO) ... .
Multi-Factor Authentication (MFA) ... .
Password Authentication Protocol (PAP) ... .
Challenge Handshake Authentication Protocol (CHAP) ... .
Extensible Authentication Protocol (EAP).