Chapter 3: Authentication, Authorization, and Accounting

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Use the login delay command for authentication attempts.

A user complains about being locked out of a device after too many unsuccessful AAA login attempts. What could be used by the network administrator to provide a secure authentication access method without locking a user out of a device? Use the none keyword when configuring the authentication method list. Use the aaa local authentication attempts max-fail global configuration mode command with a higher number of acceptable failures. Use the login delay command for authentication attempts. Use the login local command for authenticating user access.

Use the show aaa local user lockout command​.

A user complains about not being able to gain access to a network device configured with AAA. How would the network administrator determine if login access for the user account is disabled? Use the show aaa user command. Use the show aaa sessions command​. Use the show aaa local user lockout command​. Use the show running-configuration command​.

authorization

Because of implemented security controls, a user can only access a server with FTP. Which AAA component accomplishes this? accessibility accounting auditing authentication authorization

The locked-out user failed authentication. The locked-out user stays locked out until the clear aaa local user lockout username Admin command is issued.

Router R1 has been configured as shown, with the resulting log message. On the basis of the information that is presented, which two statements describe the result of AAA authentication operation? (Choose two.) R1(config)# enable algorithm-type scrypt R1(config)# enable secret 9 nfdklshoiw3u9oituqoiklajfiodur9jfdaoye9roei9059 R1(config)# username Admin algorithm-type scrypt secret Strong3rPa55w0rd R1(config)# aaa new-model R1(config)# aaa authentication login default local-case enable R1(config)# aaa local authentication attempts max-fail 1 R1(config)# exit R1# Apr 26 22:44:05.971: %AAA-5-USER_LOCKED: User Admin locked out on authentication failure The locked-out user failed authentication. The locked-out user is locked out for 10 minutes by default. The locked-out user stays locked out until the interface is shut down then re-enabled. The locked-out user should have used the username admin and password Str0ngPa55w0rd. The locked-out user stays locked out until the clear aaa local user lockout username Admin command is issued.

False single-connection keyword enhances TCP performance by maintaining a single TCP connection for the entire duration of a session. The keyword does not prevent the configuration of multiple TACACS+ servers.

The single-connection keyword prevents the configuration of multiple TACACS+ servers on a AAA-enabled router. true false

the client that is requesting authentication

What device is considered a supplicant during the 802.1X authentication process? the client that is requesting authentication the switch that is controlling network access the authentication server that is performing client authentication the router that is serving as the default gateway

Possible triggers for the aaa accounting exec default command include start-stop and stop-only.

What is a characteristic of AAA accounting? Accounting can only be enabled for network connections. Users are not required to be authenticated before AAA accounting logs their activities on the network. Possible triggers for the aaa accounting exec default command include start-stop and stop-only. Accounting is concerned with allowing and disallowing authenticated users access to certain areas and programs on the network.

TACACS+ provides authorization of router commands on a per-user or per-group basis.

What is a characteristic of TACACS+? TACACS+ is an open IETF standard. TACACS+ is backward compatible with TACACS and XTACACS. TACACS+ provides authorization of router commands on a per-user or per-group basis. TACACS+ uses UDP port 1645 or 1812 for authentication, and UDP port 1646 or 1813 for accounting.

The router collects and reports usage data related to network-related service requests.

What is the result of entering the aaa accounting network command on a router? The router outputs accounting data for all outbound connections such as SSH and Telnet. The router collects and reports usage data related to network-related service requests. The router outputs accounting data for all EXEC shell sessions. The router provides data for only internal service requests.

RADIUS

What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication? RADIUS TACACS+ SSH MD5

It accepts a locally configured username, regardless of case.

When a method list for AAA authentication is being configured, what is the effect of the keyword local? It accepts a locally configured username, regardless of case. It defaults to the vty line password for authentication. The login succeeds, even if all methods return an error. It uses the enable password for authentication.

the switch that the client is connected to

When using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client? the switch that the client is connected to the authentication server the supplicant the router that is serving as the default gateway

local AAA

Which authentication method stores usernames and passwords in the router and is ideal for small networks? local AAA local AAA over RADIUS local AAA over TACACS+ server-based AAA server-based AAA over RADIUS server-based AAA over TACACS+

User access is restricted to certain services.

Which characteristic is an important aspect of authorization in an AAA-enabled network device? A user must be identified before network access is granted. User actions are recorded for use in audits and troubleshooting events. User access is restricted to certain services. The authorization feature enhances network performance.

accounting

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources? accessibility accounting authentication authorization

debug tacacs events

Which debug command is used to focus on the status of a TCP connection when using TACACS+ for authentication? debug aaa authentication debug tacacs accounting debug tacacs events debug tacacs

TACACS+

Which server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per-group basis? ACS SSH RADIUS TACACS+

Implement Cisco Secure Access Control System (ACS) only.

Which solution supports AAA for both RADIUS and TACACS+ servers? Implement a local database. Implement both a local database and Cisco Secure Access Control System (ACS). Implement Cisco Secure Access Control System (ACS) only. RADIUS and TACACS+ servers cannot be supported by a single solution.

The ports configured for Server1 on the router must be identical to those configured on the RADIUS server.

Which statement describes the configuration of the ports for Server1? Rtr1(config)# aaa new-model Rtr1(config)# radius server Server1 Rtr1(config-radius-server)# address iv4 192.168.1.101 auth-port 1812 acct-port 1813 Rtr1(config-radius-server)# key RADIUS-Pa55w0rd Rtr1(config-radius-server)# exit The configuration is using the default ports for a Cisco router. The configuration of the ports requires 1812 be used for the authentication and the authorization ports. The configuration will not be active until it is saved and Rtr1 is rebooted. The ports configured for Server1 on the router must be identical to those configured on the RADIUS server.

password encryption utilization of transport layer protocols

Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.) separate authentication and authorization processes password encryption utilization of transport layer protocols SIP support 802.1X support

It provides a fallback authentication method if the administrator forgets the username or password.

Why is authentication with AAA preferred over a local database method? It uses less network bandwidth. It requires a login and password combination on the console, vty lines, and aux ports.​ It provides a fallback authentication method if the administrator forgets the username or password. It specifies a different password for each line or port.

The local username database will provide a backup for authentication in the event the ACS servers become unreachable.

Why would a network administrator include a local username configuration, when the AAA-enabled router is also configured to authenticate using several ACS servers? The local username database will provide a backup for authentication in the event the ACS servers become unreachable. A local username database is required when configuring authentication using ACS servers. Without a local username database, the router will require successful authentication with each ACS server. Because ACS servers only support remote user access, local users can only authenticate using a local username database.


Ensembles d'études connexes

Chapter 1 LearningCurve. Bio 1010-05

View Set

Digital Literacy Exam Review 40-Questions

View Set

Real Estate - Exam Study Questions

View Set

hearing, speech, and vision- chapter 39

View Set

Communications 100 Final Study Guide

View Set

Ch. 19 - Introduction to Macroeconomics

View Set