Chapter 3 security study

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which component of AAA allows an administrator to track individuals who access network resources and any changes that are made to those resources?

Accounting

Which componet of AAA allows an administrator to track individuals who access network resource and any changes that are made to those resources ?

Accounting

Because of implement security controls, a user only accesses a server with FTP. Which AAA component accomplishes this?

Authorization

The single-connection keyword prevents the configuration of multiple TACACS+ servers on AAA enable routers.

False

When a methode list for AAA authentication is beign configure, what is the effect of the keyword local ?

It accepts a locally configured username, regardless of case

Which statement about TACACS+ is correct ?

It encrypt data

Why is authentication with AAA preferred over a local database method?

It provides a fallback authentication method if the administrator forgets the username or password.

Which authentication method stores usernames and passwords in the router and is ideal for small networks?

Local AAA

Which AAA authentication methode option should be used only when we are doing some teasting on a router?

None

What is a characteristic of AAA accounting?

Possible triggers for the aaa accounting exec default command include start-stop and stop-only

What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication

RADIUS

Which server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per-group basis?

TACACS+

What is a characteristic of TACACS+?

TACACS+ provides authorization of router commands on a per-user or per-group basis.

What is the result of entering the aaa accounting network command on a router?

The router collects and reports usage data related to network-related service requests.

What port state is used by 8021.X if a workstation fails authorizarion ?

Unauthorized

A user complains about being locked out of a device after too many unsuccessful AAA login attempts. What could be used by the network administrator to provide a secure authentication access method without locking a user out of a device?

Use the login delay command for authentication attempts.

A user complains about not being able to gain access to a network device configured with AAA. How would the network administrator determine if login access for the user account is disabled?

Use the show aaa local user lockout command.

Which characteristic is an important aspect of authorization in an AAA-enabled network device?

User access is restricted to certain services.

Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.)

password encryption utilization of transport layer protocols

What device is considered a supplicant during the 802.1X authentication process?

the client that is requesting authentication

When using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client?

the switch that the client is connected to


संबंधित स्टडी सेट्स

Growth and Development Adaptive Quizzing

View Set

Prep U for Brunner and Suddarth's Textbook of Medical Surgical Nursing, 13th Edition Chapter 42: Management of Patients With Musculoskeletal Disorders

View Set

French depuis quand vs. depuis combien de temps

View Set

Math Concepts and Apps - Level 5

View Set

CMA Part 2 Corporate Ethical Legislation

View Set

Ch 16- Sensory, Motor, & Integrative System

View Set

Occupational Health Psychology Quiz 1

View Set