Chapter 10
Which authentication standard is highly time sensitive? A. PAP B. RADIUS C. 802.1X D. Kerberos
All Kerberos tickets are timestamped
Which type of access control requires a label to define its sensitivity?
MAC
In a PKI encryption method, which key encrypts the data?
Public
If you saw some traffic running on UDP ports 1812 and 1813, what AAA standard would you know was running? A. PPP B. RADIUS C. MS-CHAP D. TACACS+
RADIUS uses UDP ports 1812 and 1813
In order to have a PKI you must have an
Root authority
Which of the following is a common hash function? A. SHA-3 B. RC4 C. AES D. BMX
SHA-3
Any encryption that uses the same key for encryption and decryption is called
Symmetric key
A user is concerned that his password is being sent in clear text when he connects to the RADIUS server using PAP. Which of the following is True about security using RADIUS.
a
Jerry wants to avoid the hassle of manually assigning TCP/Ip configuration to each machine on his network. What can he use to configure each system without such a hassle? A. WINS server B. DNS server C. FTP server D. DHCP server
a
Several switches are being configured by a network technician so they can be remotely managed. which switch element must be configured to support SSH connections to each drive, as well as to retrieve various parameters.
a
This authentication protocol is supported by most network OS, but is never used because it sends passwords in clear text. A. PAP B. EAP C. Kerberos D. MS-CHAP E. MS-CHAP v.2
a
What are examples of symmetric and asymmetric encryption? A. DES B. AES C. PGP D. RC4 E. ECC
a
What is the general purpose of hashing?
a
What utility enables Jones to safely remote control a UNIX Web server from his office system? A. Netstat B. SSH C. Telnet D. Nbstat
a
What would someone want to use SNMP?
a
Which of the following are authentication services? A. TKIP B. EAP C. Kerberos D. AES E. TACACS+
a
Which of the following is a way to transfer files securely from one device to another? A. TFTP B. Telnet C. SFTP D. AES
a
Which of the following methods of authentication also provide AAA and uses UDP? A. TACACS+ B. RADIUS C. RSA D. Kerberos
a
Which options represent common hashing techniques? A. SNMP B. SFTP C. SHA D. PAP E. MD5
a
Which service(s) is most likely to need an NTP server? A. 801.1x B. PKI C. EAP-TLS D. Kerberos
a
Which technology is an authentication solution that uses TCP and also provides AAA? A. Radius B. RSA C. Kerberos D. TACACS+
a
a technician needs to manage a multi-layer switch with a secure connection. Which protocol should she use? A. SSH B. HTTP C. Telnet D. SMTP
a
what security protocol us used by HTTPS?
a
The process of verifying with a high degree of confidence that the sender is who the receiver thinks he or she should be is called
nonrepudiation
A hash function is by definition a
one-way function
RC4 is an ________ cipher
stream