Upgrade to remove ads
Only SGD 41.99/year
- Other
- Computer Skills
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set [35]
Which of the following is the verification of a person's identity?
A. Authorization
B. Accountability
C. Authentication
D. Password
Authentication
Which of the following would fall into the category of "something a person is"?
A.
Passwords
B. Passphrases
C. Fingerprints
D. Smart cards
Fingerprints
Which of the following are good practices for tracking user identities? [Select the two best answers]
A. Video cameras
B. Key card door access systems
C. Sign-in sheets
D. Security guards
Video cameras
Key card door access systems
What are two examples of common single sign-on authentication configurations? [Select the two best answers.]
A. Biometrics-based
B. Multifactor authentication
C. Kerberos-based
D. Smart card-based
Kerberos-based
Smart card-based
Which of the following is an example of two-factor authentication?
A. L2TP and IPsec
B. Username and password
C. Thumbprint and key card
D. Client and server
Thumbprint and key cards
What is the main purpose of a physical access log?
A. To enable authorized employee access
B. To show who exited the facility
C. To show who entered the facility
D. To prevent unauthorized employee access
To show who entered the facility
Which of the following is not a common criteria when authenticating users?
A. Something you do
B. Something you are
C. Something you know
D. Something you like
Something you like
Of the following, what two authentication mechanisms require something you physically possess? [Select the two best answers.]
A. Smart card
B. Certificate
C. USB flash drive
D. Username and password
Smart card
USB
flash drive
Which of the following is the final step a user needs to take before that user can access domain resources?
A. Verification
B. Validation
C. Authorization
D. Authentication
Authorization
To gain access to your network, users must provide a thumbprint and a username and password. What type of authentication model is this?
A.
Biometrics
B. Domain logon
C. Multifactor
D. Single sign-on
Multifactor
The IT director has asked you to set up an authentication model in which users can enter their credentials one time, yet still access multiple server resources. What type of authentication model should you implement?
A. Smart card and biometrics
B. Three-factor authentication
C. SSO
D. VPN
SSO
What types of technologies are used by external motion detectors? [Select the two best answers.]
A. Infrared
B. RFID
C. Gamma rays
D. Ultrasonic
Infrared
Ultrasonic
Which of the following results occurs when a biometric system identifies a legitimate user as unauthorized?
A. False rejection
B. FAR
C. False
acceptance
D. CER
E. False exception
False rejection
Of the following, which is not a logical method of access control?
A. Username/password
B. Access control lists
C. Biometrics
D. Software-based policy
Biometrics
Your data center has highly critical information. Because of this you want to improve
upon physical security. The data center already has a video surveillance system. What else can you add to increase physical security? [Select the two best answers.]
A. A software-based token system
B. Access control lists
C. A mantrap
D. Biometrics
A mantrap
Biometrics
Two items are needed before a user can be given access to the network. What are these two items?
A. Authentication and
authorization
B. Authorization and identification
C. Identification and authentication
D. Password and authentication
Identification and authentication
Which of the following best describes the proper method and reason to implement port security?
A. Apply a security control that ties specific ports to end-device MAC addresses, and prevents additional devices from being connected to the
network.
B. Apple a security control that ties specific ports to end-devices IP addresses, and prevents additional devices from being connected to the network.
C. Apple a security control that ties specific ports to end-device MAC addresses, and prevents all devices from being connected to the network.
D. Apply a security control that ties specific ports to end-device IP addresses, and prevents all devices from being connected to the network.
Apply a security control that ties specific ports to end-device MAC addresses, and prevents additional devices from being connected to the network.
Which two options can prevent unauthorized employees from entering a server room? [Select the two best answers]
A. Bollards
B. CCTV
C. Security guard
D. 802.1X
E. Proximity reader
Security guard
Proximity reader
Before gaining access to the data center, you must swipe your finger on a device. What type of authentication is this?
A. Biometrics
B. Single sign-on
C. Multifactor
D. Tokens
Biometrics
Your organization provides employee badges that are encoded with a private encryption key and specific personal information. The encoding is used to provide access to the organization's network. What type of authentication method is being used?
A. Token
B. Biometrics
C. Kerberos
D. Smart card
Smart card
Which of the following about authentication is false?
A. RADIUS is a client-server system that provides authentication, authorization, and accounting services.
B. PAP is insecure because usernames and passwords are sent as clear text.
C. MS-CHAPv2 is not capable of mutual
authentication of the client and sever.
D. CHAP is more secure than PAP because it encrypts usernames and passwords.
MS-CHAPv2 is not capable of mutual authentication of the client and sever.
In a secure environment, which authentication mechanism performs better?
A. RADIUS because it is a remote access authentication service.
B. RADIUS because it encrypts client-server passwords.
C. TACACS+
because it is a remote access authentication service.
D. TACACS+ because it encrypts client-server negotiation dialogues.
TACACS+ because it encrypts client-server negotiation dialogues.
Which port number does the protocol LDAP use when it is secured?
A. 389
B. 443
C. 636
D. 3389
636
Which of the following permits or denies access to resources through the use of ports?
A. Hub
B. 802.11n
C. 802.11x
D. 802.1X
802.1X
Which authentication method completes the following in order: logon request, encrypts value response, server, challenge, compare encrypted results, and authorize or fail referred to?
A. Security tokens
B. Certificates
C. Kerberos
D. CHAP
CHAP
What does a virtual private network use to connect one remote host to another?
A. Modem
B. Network adapter
C. Internet
D. Cell phone
Internet
Kerberos uses which of the following? [Select the two best answers.]
A. Ticket distribution service
B. The Faraday cage
C. Port 389
D. Authentication service
Ticket distribution service
Authentication service
Which of the following authentication systems makes use of a Key Distribution Center?
A. Security tokens
B. CHAP
C. Kerberos
D. Certificates
Kerberos
Of the following, which best describes the difference between RADIUS and TACACS+?
A. RADIUS is a remote access
authentication service.
B. RAIDUS separates authenticates, authorization, and auditing capabilities.
C. TACACS+ is a remote access authentication service.
D. TACACS+ separates authentication, authorization, and auditing capabilities.
TACACS+ separates authentication, authorization, and auditing capabilities.
You are tasked with setting up a wireless network that uses 802.11X for authentication. You set up the wireless network using WPA2 and CCMP; however, you don't want to use a PSK for authentication. Which of the following options would support 802.11X authentication?
A. Kerberos
B. CAC card
C. Pre-shared key
D. RADIUS
RADIUS
What is the most secure method of authentication and authorization in its default form?
A. TACACS
B. Kerberos
C. RADIUS
D. LDAP
Kerberos
When attempting to grant access to remote users, which protocol uses separate, multiple-challenge responses for each of the authentication, authorization, and audit processes?
A. RADIUS
B. TACACS
C. TACACS+
D. LDAP
TACACS+
Which of the following is an authentication system that uses UDP as the transport mechanism?
A.
LDAP
B. Kerberos
C. RADIUS
D. TACACS+
RADIUS
You are in charge of training a group of technicians on the authentication method their organization uses. The organization currently runs an Active Directory infrastructure. Which of the following best correlates to the host authentication protocol used within that organization's IT environment?
A. TACACS+
B. Kerberos
C. LDAP
D. 802.1X
Kerberos
Which of the following is an authentication and accounting service that uses TCP as its transport mechanism when connecting to routers and switches?
A. Kerberos
B. RADIUS
C. Captive portal
D. TACACS+
TACACS+
Sets with similar termsSecurity+ Ch.10
35 terms
LearaDobbins
Security +
95 terms
fatherof4girls
Chapter 9
20 terms
kerrymccarter
Quiz 10
35 terms
zeefountain
Other sets by this creatorOperating Systems Final Exam
128 terms
residentevil35
Operating Systems Exam 2
15 terms
residentevil35
Operating Systems Exam 1
68 terms
residentevil35
Security + - Ch. 1 - Today's Security Professional
27 terms
residentevil35
Other Quizlet setsPSY 341 - Guide 1
67 terms
mrandrewhoPLUS
fina 481 investments wk 4 assignments
15 terms
heather_lampshire
Psychology: Chapter 1
17 terms
smashinator
Chapter 3: SB 148
64 terms
Michelle_McIlwain
Related questionsQUESTION
When your system running Windows 7 is configured to receive a DHCP address, what happens when your system cannot contact a DHCP server?
12 answers
QUESTION
Which security principle states that if you have not specifically been allowed access, then it should be denied?
10 answers
QUESTION
You would like to get a feel for the amount of bandwidth you are using in your network. What is the first thing you should do?
10 answers
QUESTION
A cookie refers to which of these
15 answers