Ch 12.5 - Comprehensive Questions
Defines fundamental security building blocks that are the core of network management and security
AAA
This process keeps track and records all the activities by all users.
Accounting
Which part of the AAA records and stores all the events related to the system.
Accounting
Key word credentials correlates with which AAA
Authentication
Single-sign-on (SSO) correlates with which AAA
Authentication
What part of the AAA is it when user to supply a username and password
Authentication
triple-A
Authentication, authorization, and accounting
Determines whether the user has the authority to perform such tasks or to access certain resources.
Authorization
It governs the privileges and tasks a user can perform after gaining access to a network or system.
Authorization
Which stage of AAA is the user at when A user gains access to a network switch and may only be authorized to view the switch but not to make any changes to it.
Authorization
It issues a special token or ticket to its authenticated users and it uses this ticket to validate user access to a resource or a service.
Kerberos
Is a security mechanism that can be implemented on a network to register, authenticate, authorize, and enforce security policies on all endpoint devices before they are allowed to access the network
NAC
Is gaining popularity as a method to manage and keep track of the devices involved in BYOD (bring your own device)
NAC
Single-sign-on (SSO)
Permits users to authenticate only once, and after successful authentication, users are trusted to access other services or systems based on the ticket.
The most widely used AAA protocol today is
RADIUS
The protocol that is used for authenticating remote users, authorizing user access, and accounting user activities
RADIUS
two of the most used access protocols
RADIUS and TACACS+
RADIUS
Remote Authentication Dial-In User Service
TACACS+
Terminal Access Controller Access-Control System Plus
A type of security appliance is popular in small to medium business
UTM
What could a UTM appliance consist of?
a firewall, a network IDS/IPS, a VPN, a gateway antivirus, gateway anti-spam, load balancing, and content filtering.
What is AAA?
a framework developed to control access to computing resources, enforce policies, and audit usage.
Kerberos
a network authentication protocol that is widely used in enterprise environments
To prepare for disaster recovery, an organization must have a __________________
backup plan
Accounting
defines and keeps track of what you do
Authentication
defines who and what you are
One of the most fundamental elements of network operations is _________________.
documentation
UTM (unified threat management)
is an all-in-one solution that integrates a wide range of security features into ONE appliance.
NAC
network access/admission control
Having ________________ helps engineers to visualize and understand how things are connected
network diagrams
Authorization
what are you allowed to do