2019-2020 Sem 3 Unit 10-13

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which access control component, implementation, or protocol is based on device roles of supplicant, authenticator, and authentication server?

802.1X

Which access control component, implementation, or protocol restricts LAN access through publicly accessible switch ports?

802.1X

Which access control component, implementation, or protocol audits what users actions are performed on the network?

Accounting

Which access control component, implementation, or protocol collects and reports usage data?

Accounting

Which access control component, implementation, or protocol logs EXEC and configuration commands configured by a user?

Accounting

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

Accounting

Which access control component, implementation, or protocol controls who is permitted to access a network?

Authentication

Which access control component, implementation, or protocol is based upon usernames and passwords?

Authentication

Which access control component, implementation, or protocol is implemented either locally or as a server-based solution?

Authentication

Which access control component, implementation, or protocol controls what users can do on the network?

Authorization

Which access control component, implementation, or protocol indicates success or failure of a client-requested service with a PASS or FAIL message?

Authorization

Which component of AAA is used to determine which resources a user can access and which operations the user is allowed to perform?

Authorization

A network administrator of a college is configuring the WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by a server. Which server would provide such service?

RADIUS

Which protocol should be used to mitigate the vulnerability of using Telnet to remotely manage network devices?

SSH

What device is considered a supplicant during the 802.1X authentication process?

the client that is requesting authentication


Conjuntos de estudio relacionados

Pharmacology Chapter 49: Drugs for Eye and Ear Disorders

View Set

Slope-Intercept Form of a Line Quiz

View Set

Sustainability Foundations Mid-term, Final Exam Intro to Sustainability

View Set

Maternity NCLEX PN, HESI: Pediatric Pharm

View Set