Live Virtual Lab 12.2: Module 12 Authentication and Authorization Solutions

¡Supera tus tareas y exámenes ahora con Quizwiz!

How many entities are involved in the 802.1x authentication process? A. 1 B. 2 C. 3 D. 4

3

Which of the following is required for two-factor authentication? [Choose all that apply] - USB drive - Password key - Password - Smart card

Password key Password Smart card

Which of the following functions can be performed by a hardware security module (HSM)? [Choose all that apply] - Encryption Keys Management - Key Exchange - Encryption and Decryption - User Password Management - Cryptographic function offloading from a server

Encryption Keys Management Key Exchange Encryption and Decryption Cryptographic function offloading from a server HSM can perform various functions including: encryption keys management key exchange encryption and decryption cryptographic functions offloading from servers HSM does not perform user password management.

Which of the following protocol uses port-based authentication? A. Extensible Authentication Protocol (EAP) B. Challenge Handshake Authentication Protocol (CHAP) C. Password Authentication Protocol (PAP) D. 802.1X

802.1X 802.1X is a port-based authentication method to authenticate devices before they can connect to a LAN, a wireless network, or even Ethernet. The Password Authentication Protocol (PAP), as the name suggests, is password-based. CHAP is an authentication protocol that performs a 3-way handshake when verifying a peer or client on the network. Extensible Authentication Protocol (EAP) is used with wireless networks.

Which of the following authentication method can use location to authenticate a user? A. Attribute-based Access Control (ABAC) B. Role-based Access Control (RBAC) C. Rule-based Access Control (RBAC) D. Mandatory Access Control (MAC)

Attribute-based Access Control (ABAC) Attribute-based access control (ABAC) works on attributes instead of users or groups. For example, city and department could be two attributes of users. If both the attributes match, the user is granted access to the object. Examples of other attributes could be a user's citizenship, time, or location. Role-based access control (RBAC), also known as non-discretionary access control, works by assigning permissions based on the user's position in a hierarchy. In this kind of access control, a user, when required to access an object, is put into a role or group, and then the group is assigned access to the object. Rule-based access control (RBAC), uses rules to allow or deny access to a resource. Access permissions are stored in the access control lists (ACLs). Mandatory access control (MAC) is the strictest in controlling access to an object. It classifies resources and users, and permissions are assigned based on these classifications. Mandatory access control allows the administrator or group of authorized individuals to control access to resources.


Conjuntos de estudio relacionados

Exam 3: Chapter 11 - Customer Relationship Management

View Set

Ricci 38 Nursing Care of the Child With an Alteration in Intracranial Regulation/Neurologic Disorder

View Set

Ch. 2 The First Amendment. The Meaning of Freedom

View Set

EXAM 2: CHAPTER 50 DIABETES MELLITUS & THE METABOLIC SYNDROME

View Set

MGMT 350 Ferris State University Browers

View Set