Security+ Ch 8 Fall 2018

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

3. What are good examples of two-factor authentication? Choose all that apply.

A credit card and a signature; A password followed by a PIN texted to your phone

5. A secure records room installed a new iris scanner, chosen for its low crossover error rate. What does that mean it has? Choose the best response.

A low false acceptance rate and a low false rejection rate

1. What AAA element specifies the exact resources a given principal is allowed to access? Choose the best response.

Authorization

10. Your remote access system currently uses RADIUS, but one administrator is proposing replacing it with TACACS+. What benefits might this provide?. Choose all that apply.

Better able to support non-IP protocols; More secure; Better suited to large networks

4. What authentication standard is used by active duty US military personnel?

CAC

8. Which protocol is more of a message framework than an authentication method in itself? Choose the best response.

EAP

12. Unlike LDAP, LDAPS ________? Choose all that apply.

Includes SSL or TLS encryption; Uses port 636

13. Your company is developing a custom web app for the sales team. It should be able to access a list of Salesforce contacts, but for security reasons the app shouldn't be able to access the actual Salesforce account. What standard would allow this? Choose the best response.

OAuth

7. You've been instructed to implement two-factor authentication for a secure system. What of the following would qualify? Choose all that apply.

Password and iris scan; Password and OTP; Smart card and fingerprint scan

9. Your wireless network is configured in 802.1X mode. What kind of server does it most likely use as a back end? Choose the best response.

RADIUS

11. You've been asked to help consult for security on an application that's designed to interoperate with Google and Salesforce SSO systems. What protocol should you study first? Choose the best answer.

SAML

2. You require your users to log on using a user name, password, and rolling 6-digit code sent to a key fob device. They are then allowed computer, network, and email access. What type of authentication have you implemented? Choose all that apply.

Single sign-on; Multi-factor authentication

6. Federated identity management allows authentication systems to be shared across multiple directly associated systems or networks. True or false?

True


Kaugnay na mga set ng pag-aaral

1.Sample Exam - Questions ISTQB® Certified Tester Syllabus Foundation Level Exam ID: B

View Set

Fundamentals of Nursing PrepU Ch. 1

View Set

Math 6 Review Sheet Place Value, Rounding, and Fraction Basics- Page 2

View Set

Ch. 14: Encryption and Hashing Concepts

View Set

Experiencing the Lifespan - Chapter 5

View Set