Chapter 9
Biometrics
Before gaining access to the data center, you must swipe your finger on a device. What type of authentication is this?
Authentication service, Ticket distribution service
Kerberos uses which of the following? (Select the two best answers.)
Smart card, USB flash drive
Of the following, what two authentication mechanisms require something you physically possess? (Select the two best answers.)
SSO
The IT director has asked you to set up an authentication model in which users can enter their credentials one time, yet still access multiple server resources. What type of authentication model should you implement?
Multifactor
To gain access to your network, users must provide a thumbprint and a username and password. What type of authentication model is this?
Identification and authentication
Two items are needed before a user can be given access to the network. What are these two items?
Kerberos
What is the most secure method of authentication and authorization in its default form?
Kerberos
Which of the following authentication systems makes use of a Key Distribution Center?
Apply a security control that ties specific ports to end-device MAC addresses, and prevents additional devices from being connected to the network.
Which of the following best describes the proper method and reason to implement port security?
RADIUS
Which of the following is an authentication system that uses UDP as the transport mechanism?
Thumbprint and key card
Which of the following is an example of two-factor authentication?
Something you like
Which of the following is not a common criteria when authenticating users?
Authorization
Which of the following is the final step a user needs to take before that user can access domain resources?
Authentication
Which of the following is the verification of a person's identity?
False rejection
Which of the following results occurs when a biometric system identifies a legitimate user as unauthorized?
636
Which port number does the protocol LDAP use when it is secured?
Security guard, proximity reader
Which two options can prevent unauthorized employees from entering a server room? (Select the two best answers.)
Kerberos
You are in charge of training a group of technicians on the authentication method their organization uses. The organization currently runs an Active Directory infrastructure. Which of the following best correlates to the host authentication protocol used within that organization's IT environment?
A mantrap, biometrics
Your data center has highly critical information. Because of this you want to improve upon physical security. The data center already has a video surveillance system. What else can you add to increase physical security? (Select the two best answers.)
Smart card
Your organization provides to its employees badges that are encoded with a private encryption key and specific personal information. The encoding is used to provide access to the organization's network. What type of authentication method is being used?