Chapter 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

Biometrics

Before gaining access to the data center, you must swipe your finger on a device. What type of authentication is this?

Authentication service, Ticket distribution service

Kerberos uses which of the following? (Select the two best answers.)

Smart card, USB flash drive

Of the following, what two authentication mechanisms require something you physically possess? (Select the two best answers.)

SSO

The IT director has asked you to set up an authentication model in which users can enter their credentials one time, yet still access multiple server resources. What type of authentication model should you implement?

Multifactor

To gain access to your network, users must provide a thumbprint and a username and password. What type of authentication model is this?

Identification and authentication

Two items are needed before a user can be given access to the network. What are these two items?

Kerberos

What is the most secure method of authentication and authorization in its default form?

Kerberos

Which of the following authentication systems makes use of a Key Distribution Center?

Apply a security control that ties specific ports to end-device MAC addresses, and prevents additional devices from being connected to the network.

Which of the following best describes the proper method and reason to implement port security?

RADIUS

Which of the following is an authentication system that uses UDP as the transport mechanism?

Thumbprint and key card

Which of the following is an example of two-factor authentication?

Something you like

Which of the following is not a common criteria when authenticating users?

Authorization

Which of the following is the final step a user needs to take before that user can access domain resources?

Authentication

Which of the following is the verification of a person's identity?

False rejection

Which of the following results occurs when a biometric system identifies a legitimate user as unauthorized?

636

Which port number does the protocol LDAP use when it is secured?

Security guard, proximity reader

Which two options can prevent unauthorized employees from entering a server room? (Select the two best answers.)

Kerberos

You are in charge of training a group of technicians on the authentication method their organization uses. The organization currently runs an Active Directory infrastructure. Which of the following best correlates to the host authentication protocol used within that organization's IT environment?

A mantrap, biometrics

Your data center has highly critical information. Because of this you want to improve upon physical security. The data center already has a video surveillance system. What else can you add to increase physical security? (Select the two best answers.)

Smart card

Your organization provides to its employees badges that are encoded with a private encryption key and specific personal information. The encoding is used to provide access to the organization's network. What type of authentication method is being used?


Conjuntos de estudio relacionados

BIOL 1010-Reproduction at the Cellular Level Study Guide; Chp. 6

View Set

PATH CH 25: Acid-Base Homeostasis and Imbalances

View Set

CompTIA Security+ Practice Tests 1 89 question exams

View Set

WGU C203 Ch. 11 Creativity, Innovation, and Leadership

View Set