Ch 12.5 - Comprehensive Questions

Ace your homework & exams now with Quizwiz!

Defines fundamental security building blocks that are the core of network management and security

AAA

This process keeps track and records all the activities by all users.

Accounting

Which part of the AAA records and stores all the events related to the system.

Accounting

Key word credentials correlates with which AAA

Authentication

Single-sign-on (SSO) correlates with which AAA

Authentication

What part of the AAA is it when user to supply a username and password

Authentication

triple-A

Authentication, authorization, and accounting

Determines whether the user has the authority to perform such tasks or to access certain resources.

Authorization

It governs the privileges and tasks a user can perform after gaining access to a network or system.

Authorization

Which stage of AAA is the user at when A user gains access to a network switch and may only be authorized to view the switch but not to make any changes to it.

Authorization

It issues a special token or ticket to its authenticated users and it uses this ticket to validate user access to a resource or a service.

Kerberos

Is a security mechanism that can be implemented on a network to register, authenticate, authorize, and enforce security policies on all endpoint devices before they are allowed to access the network

NAC

Is gaining popularity as a method to manage and keep track of the devices involved in BYOD (bring your own device)

NAC

Single-sign-on (SSO)

Permits users to authenticate only once, and after successful authentication, users are trusted to access other services or systems based on the ticket.

The most widely used AAA protocol today is

RADIUS

The protocol that is used for authenticating remote users, authorizing user access, and accounting user activities

RADIUS

two of the most used access protocols

RADIUS and TACACS+

RADIUS

Remote Authentication Dial-In User Service

TACACS+

Terminal Access Controller Access-Control System Plus

A type of security appliance is popular in small to medium business

UTM

What could a UTM appliance consist of?

a firewall, a network IDS/IPS, a VPN, a gateway antivirus, gateway anti-spam, load balancing, and content filtering.

What is AAA?

a framework developed to control access to computing resources, enforce policies, and audit usage.

Kerberos

a network authentication protocol that is widely used in enterprise environments

To prepare for disaster recovery, an organization must have a __________________

backup plan

Accounting

defines and keeps track of what you do

Authentication

defines who and what you are

One of the most fundamental elements of network operations is _________________.

documentation

UTM (unified threat management)

is an all-in-one solution that integrates a wide range of security features into ONE appliance.

NAC

network access/admission control

Having ________________ helps engineers to visualize and understand how things are connected

network diagrams

Authorization

what are you allowed to do


Related study sets

Chapter 7: The Empires of Persia

View Set

Missed Test questions + Study Cards

View Set

Fitness Assessment/Prescription: EXSC U455

View Set

Ch 19 quiz: Appraisal of Property

View Set

Chapter 7 - Investment Vehicle Characteristics

View Set