Computer Security Chapter 11

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

On a VPN, traffic is encrypted and decrypted at:

Endpoints of the tunnel only.

Authentication is typically based upon what?

Authentication is commonly performed with passwords (something you know), tokens (something you have), and biometrics (such as fingerprints).

IPsec provides which options as security services?

ESP and AH. Feedback: IPsec utilizes Encapsulating Security Payload and Authentication Header.

IPsec can provide which of the following types of protection?

Feedback: IPsec can provide both context and content protection by using both ESP and AH.

To establish an L2TP connection across a firewall, you must do which of the following?

Feedback: L2TP uses UDP port 1701 to establish communications, so this port must be open across a firewall for L2TP to function correctly.

What are the foundational elements of an access control system?

Identification, authorization, authentication.

A ticket-granting server is an important element in which of the following authentication models?

Kerberos uses ticket-granting servers to manage the issuance of tickets granting various permissions on the system.

Which statement best describes differences between RADIUS and TACACS+?

One of the fundamental design aspects of TACACS+ is the separation of authentication, authorization, and accounting in this protocol.

Which protocols are natively supported by Microsoft Windows XP and Vista for use in securing remote connections?

PPTP is supported by Microsoft Windows XP and Vista operating systems.

To establish a PPTP connection across a firewall, you must do which of the following?

PPTP uses TCP port 1723 to establish communications, so this port must be open across a firewall for PPTP to function correctly.

Which of these protocols is used for carrying authentication, authorization, and accounting information between a network access server and a shared authentication server?

RADIUS

Secure Shell uses which port to communicate?

SSH initiates conversations over TCP port 22.

Passwords are an example of:

Something you know. They are defined as something you know, and are not to be shared.

Elements of Kerberos include which of the following?

Ticket-granting ticket, authentication server, ticket.

What protocol is used for RADIUS?

UDP. RADIUS has been officially assigned UDP ports 1812 for RADIUS Authentication and 1813 for RADIUS Accounting by the Internet Assigned Number Authority (IANA). However, previously, ports 1645 (Authentication) and 1646 (Accounting) were used unofficially and became the default ports assigned by many RADIUS client/server.


Set pelajaran terkait

FINISHED Ethics: Chapter 7 (REWARDS AND PUNISHMENTS)

View Set

Botany Test 1 (Ferns and Fern Allies)

View Set

Nursing Informatics Exam 1 Poll Questions

View Set

Business Law I (Exam 1) - Wright SBU

View Set