Security+ Ch04
Which port does non-encrypted LDAP use?
389
Which of the following is an example of two-factor authentication?
A fingerprint and a password
Which of the following is an advantage of SSO (Single Sign-on)?
Access to all authorized resources with a single instance of authentication
Which of the following Evaluation Assurance Levels (EAL) is the common security benchmark for commercial systems?
EAL 4
Which of the following is NOT a tunneling protocol?
SLIP
Which remote access protocol, implemented almost exclusively by Cisco, is a central server providing remote access usernames that dial-up users can use for authentication?
TACACS+
Which of the following is the strongest form of multi-factor authentication?
A password, biometric scan, and a token device
Which access control method model allows the owner of a resource to grant privileges to information they own?
DAC
Which authentication method uses a Key Distribution Center (KDC)?
Kerberos
Which access control model is a static model that uses predefined access privileges for resources that are assigned by the administrator?
MAC
Whether or not your server operating system can force the change of a password is considered what kind of a security issue?
Operational
Which access control method model grants rights or privileges based on their job function or position held?
RBAC