Chapter 11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What protocol is used for RADIUS? A) UDP B) NetBIOS C) TCP D) Proprietary

Correct Answer: A

IPsec provides which options as security services? A) ESP and AH B) ESP and AP C) EA and AP D) EA and AH

Correct Answer: A

On a VPN, traffic is encrypted and decrypted at: A) Endpoints of the tunnel only B) Users' machines C) Each device at each hop D) The data link layer of access devices

Correct Answer: A

Elements of Kerberos include which of the following? A) Tickets, ticket-granting server, ticket-authorizing agent B) Ticket-granting ticket, authentication server, ticket C) Services server, Kerberos realm, ticket authenticators D) Client-to-server ticket, authentication server ticket, ticket

Correct Answer: B

Passwords are an example of: A) Something you have B) Something you know C) A shared secret D) None of the above

Correct Answer: B

Which protocols are natively supported by Microsoft Windows XP and Vista for use in securing remote connections? A) SSH B) PPTP C) IPsec D) RADIUS

Correct Answer: B

IPsec can provide which of the following types of protection? A) Context protection B) Content protection C) Both context and content protection D) Neither context nor content protection

Correct Answer: C

Secure Shell uses which port to communicate? A) TCP port 80 B) UDP port 22 C) TCP port 22 D) TCP port 110

Correct Answer: C

A ticket-granting server is an important element in which of the following authentication models? A) L2TP B) RADIUS C) PPP D) Kerberos

Correct Answer: D

Authentication is typically based upon what? A) Something a user possesses B) Something a user knows C) Something measured on a user, such as a fingerprint D) All of the above

Correct Answer: D

To establish a PPTP connection across a firewall, you must do which of the following? A) Do nothing; PPTP does not need to cross firewalls by design. B) Do nothing; PPTP traffic is invisible and tunnels past firewalls. C) Open a UDP port of choice and assign it to PPTP. D) Open TCP port 1723.

Correct Answer: D

To establish an L2TP connection across a firewall, you must do which of the following? A) Do nothing; L2TP does not cross firewalls by design. B) Do nothing; L2TP tunnels past firewalls. C) Open a UDP port of choice and assign it to L2TP. D) Open UDP port 1701.

Correct Answer: D

What are the foundational elements of an access control system? A) Passwords, permissions, cryptography B) Shared secrets, authorization, authenticators C) Authentication, permissions, user IDs D) Identification, authorization, authentication

Correct Answer: D

Which of these protocols is used for carrying authentication, authorization, and accounting information between a network access server and a shared authentication server? A) IPsec B) VPN C) SSH D) RADIUS

Correct Answer: D

Which statement best describes differences between RADIUS and TACACS+? A) RADIUS is for Microsoft Windows only. B) TACACS+ is faster than RADIUS. C) RADIUS is a remote identification service. D) TACACS+ separates authentication, authorization, and accounting

Correct Answer: D


Ensembles d'études connexes

Quiz 9 Questions- Chapters 82, 84, 85, 86

View Set

Unit 4 > Topic 45: Normal and Abnormal Uterine Bleeding

View Set

Competitive Effectiveness Test #1

View Set

EMT Chapter 28 Abdominal & Genitourinary Injuries

View Set