M5 & M6-FORMATIVE

Ace your homework & exams now with Quizwiz!

True

A Certificate Revocation is a private key compromised. Group of answer choices False True

Implement Kerberos

A company is deploying a file-sharing protocol access a network and needs to select a protocol for authenticating clients. Management requests that the service be configured in the most secure way possible. The protocol must also be capable of mutual authentication, and support SSO and smart card logons. Which of the following would BEST accomplish this task? Group of answer choices Use MSCHAP authentication Implement Kerberos Store credentials in LDAP Use NTLM authentication

Account lockout

A network administrator is brute forcing accounts through a web interface. Which of the following would provide the BEST defense from an account password being discovered?

Certificate Revocation

A sort of blacklist that instructs the RADIUS not to authenticate those certificates Group of answer choices Certificate Revocation Certificate Validation Certificate Issuance Certificate Renewal

User account

A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials. Which of the following account types is the systems administrator using? Group of answer choices Guest account User account Service account Shared account

Certificate Life Cycle

An entity can be a person, a device, or even just a few lines of code Group of answer choices Certificate Issuance Certificate Life Cycle Certificate Enrollment Certificate Validation

Certificate Revocation

Certificates contain a termination date that's indicated when they are first issued in this period

True

Create passwords with at least eight characters. Group of answer choices True False

Private Key Replacement Process

Destroy original key. Group of answer choices Private Key Protection Methods Private Key Restoration Methods Private Key Replacement Process None of the above

None of the above

Encrypt data with new key. Group of answer choices Private Key Protection Methods Private Key Replacement Process Private Key Restoration Methods None of the above

Once they agree on an encryption level, the client generates a session key, encrypts it, and sends it with the public key from the server.

Encryption in SSL Enrollment Process means

False

Every time the certificate is used to authenticate, the RADIUS server checks with the CA to confirm that the certificate is still valid and hasn't expired or been revoked.

Strong password

Ik4wLhung$4paTn4 is a Group of answer choices Weak password Strong password Maybe None of the above

Certificate Life Cycle

In these, shorter life cycles permit for reestablishment of more secure certificates.

Certificate Validation

In this stage, a substance can be an individual, a gadget, or indeed fair some lines of code Group of answer choices Certificate Validation Certificate Enrollment Certificate Issuance Certificate Life Cycle

Certificate Validation

In this stage, a substance submits a request for a certificate to the Certificate Authority (CA).

Encryption

In this stage, once they agree on an encryption level, the client generates a session key, encrypts it, and sends it with the public key from the server.

Negotiation

In this stage, the server and client then negotiate an encryption level. Group of answer choices Response Request Encryption Negotiation

Response

In this stage, the server responds by sending its digital certificate and public key to the client.

True

Instead of automatically being shunted to a CRL, some CA's have settings that renew certificates upon expiration date, though typically they re-verify identity. At this time, you can choose whether to generate a new key pair - effectively making it a totally new certificate. Group of answer choices True False

Digital certificate

It certifies the ownership of a open key by the named subject of the certificate.

Key Management

It concerns keys at the client level, either between clients or systems.

Key Management

It concerns keys at the user level, either between users or systems. Group of answer choices Key Management Certificate Authority Private Key Public Key

Account management

It controls the benefits and capacities of an application. Group of answer choices Shared account Service accounts Account management User account

TOTP

It could be a brief passcode produced by a calculation that uses the current time of day as one of its verification components Group of answer choices TACACS HOTP SAML TOTP

Privileged account

It exists in many forms across the enterprise environment and they pose significant security risks if not protected, managed and monitored. Group of answer choices Account policy Account lockout Privileged account Federated identity

Privileged accounts

It frequently avoids the establishment of modern applications, changes to worldwide settings or rules, and limits other capacities or records, centering on core commerce usefulness Group of answer choices User account Service accounts Shared account Privileged accounts

LDAP

It gives the communication dialect that applications utilize to communicate with other directory services servers Group of answer choices LDAPS LDAP Directory Services Active Directory

Anonymous authentication

It grants client anonymous status to LDAP.

Key Management

It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Group of answer choices Key Management Certificate Authority Private Key Public Key

Key Management

It incorporates cryptographic protocol plan, key servers, client strategies, and other significant protocols Group of answer choices Private Key Public Key Certificate Authority Key Management

Public CA

It is a certificate authority that provides services to the general public. Group of answer choices Root CA Public CA Intermediate CA Private CA

Account Policy

It is a document which outlines the requirements for requesting and maintaining an account on computer systems or networks, typically within an organization.

Account policy

It is a document which outlines the requirements for requesting and maintaining an account on computer systems or networks, typically within an organization. Group of answer choices Account policy Federated identity Account lockout Privileged account

Group Policy

It is a feature of the Microsoft Windows NT family of operating systems that controls the working environment of user accounts and computer accounts. Group of answer choices Group Policy Complex password Account lockout Credential Management

PGP

It is a freeware email encryption system that uses symmetrical and asymmetrical encryption. Group of answer choices RADIUS PAP PGP CHAP

None of the above

It is a method to delete from insecure media Group of answer choices Private Key Protection Methods Private Key Replacement Process Private Key Restoration Methods None of the above

Private Key Restoration Methods

It is a method to require restoration password. Group of answer choices Private Key Protection Methods Private Key Restoration Methods Private Key Replacement Process None of the above

None of the above

It is a method to use key escrow. Group of answer choices Private Key Replacement Process None of the above Private Key Restoration Methods Private Key Protection Methods

Certificate Renewal

It is a renewal process upholds security and accessibility. Group of answer choices OCSP Certificate Trust Chain Certificate Renewal Key Escrow

Certificate authentication

It is a scheme that uses a public key cryptography and digital certificate to authenticate a user.

CA

It is a substance that issues computerized certificates.

PKI

It is a system consisting of hardware, software, policies, and procedures that create, manage, distribute, use, store, and revoke digital certificates. Group of answer choices PKI Certificate authentication Digital certificate CA

TOTP

It is an OTP creation calculation based on occasion synchronization, and the client and verification server share the mystery key K. Group of answer choices HOTP TACACS SAML TOTP

Digital certificate

It is an electronic document that contains an identity such as a user or organization and a corresponding public key Group of answer choices CA Certificate authentication Digital certificate PKI

Digital certificate

It is an electronic record that contains a character such as a client or organization and a comparing open key Group of answer choices Digital certificate PKI Certificate authentication CA

CA

It is an entity that issues digital certificates. Group of answer choices Certificate authentication CA Digital certificate PKI

Credential Management

It is an established form of software that is used for issuing and managing credentials as part of public key infrastructure (PKI). Group of answer choices Credential Management Account lockout Complex password Group Policy

Root CA

It is an important part of creating a robust and secure intranet Group of answer choices Public CA Intermediate CA Root CA Private CA

SAML

It is an open standard that permits identity providers (IdP) to pass authorization qualifications to service suppliers. Group of answer choices OTP RADIUS TACACS SAML

OTP

It is considered more secure since the secret word keeps on changing, meaning that it isn't defenseless against replay assaults Group of answer choices SAML OTP TACACS RADIUS

Digital certificate

It is like a driver's license or passport that contains a user's photograph and thumbprint, so that there is no doubt about the user's identity. Group of answer choices Digital certificate CA Certificate authentication PKI

User account

It is often used by teams that share similar functions - known as group-based access - or by casual users that need access to a system in a limited capacity. Group of answer choices Service accounts User account Privileged accounts Shared account

Account management

It is one of the foremost imperative viewpoints of an organization's security pose Group of answer choices Shared account Account management User account Service accounts

Shared account

It is one that can be utilized by more than one allotted client.

Shared account

It is one that can be utilized by more than one assigned user. Group of answer choices Service accounts Shared account User account Privileged accounts

PKI

It is that it uses a pair of keys to achieve the underlying security service. The key pair comprises of private key and public key. Group of answer choices PKI CA Digital certificate Certificate authentication

CA

It is the authority responsible for issuing SSL certificates publicly trusted by web browsers. Group of answer choices CA Certificate authentication Digital certificate PKI

RADIUS

It is the connect between the verification of a user's personality and the authorization to utilize a service. Group of answer choices TACACS OTP SAML RADIUS

Layer 2 Tunneling Protocol (L2TP)

It is the industry standard when setting up secure tunnels. Group of answer choices Point-to-Point Tunneling Protocol (PPTP) Tunneling Kerberos Layer 2 Tunneling Protocol (L2TP)

Credential Management

It is the set of practices that an organization uses to issue, track, update, and revoke credentials for identities within their context. Group of answer choices Account lockout Complex password Credential Management Group Policy

Certificate Revocation

It is the solution on Private key that had been compromised Group of answer choices Certificate Revocation List Certificate Chain Certificate Trust Chain Certificate Revocation

Certificate authentication

It is the utilize of a Digital Certificate to recognize a client, machine, or gadget before giving access to a asset, network, application, etc.

Directory Services

It is used for locating, managing, and administering common items and network resources, such as volumes, folders, files, printers, users, groups, devices, telephone numbers, and other objects.

Digital certificate

It is utilized to demonstrate a person's character; it can be utilized for verification. Group of answer choices Digital certificate PKI CA Certificate authentication

Certificate Trust Chain

It lacks encryption. Group of answer choices Certificate Renewal Key Escrow OCSP Certificate Trust Chain

LDAPS

It makes use of port 636.

Kerberos

It makes use of port 88.

Directory Services

It maps the network names of network resources to network addresses and define a naming structure for networks.

RADIUS

It may be a farther convention utilized to connect with a server in systems. Group of answer choices RADIUS SAML TACACS OTP

Privileged accounts

It often prevents the installation of new applications, changes to global settings or rules, and limits other functions or files, focusing on core business functionality. Group of answer choices Shared account Privileged accounts User account Service accounts

Account lockout

It prevents the user from logging onto the network for a period even if the correct password is entered. Group of answer choices Privileged account Federated identity Account policy Account lockout

Active Directory

It provides Single-Sign On (SSO) and works well in the office and over VPN. Group of answer choices Active Directory Directory Services LDAPS LDAP

Privileged accounts

It provides a nice balance between complete system-wide permission and fine-tuned privileges based on the exact needs of the software by granting access, permissions, and rights in a completely custom fashion. Group of answer choices Shared account User account Privileged accounts Service accounts

LDAP

It provides the communication language that applications use to communicate with other directory services servers.

certificate enrollment

It refers to the process by which a user requests a digital certificate. Group of answer choices Online root CAs certificate release Offline root CAs certificate enrollment

Key backup

It restores from backup media. Group of answer choices None of the above Private Key Replacement Process Private Key Protection Methods Key backup

OCSP

It sends response with certificate's status. Group of answer choices Certificate Renewal OCSP Key Escrow Certificate Trust Chain

LDAP

It stores the users, passwords, and computer accounts, and share that information with other entities on the network.

Active Directory

It supports both Kerberos and LDAP - Microsoft AD is by far the most common directory services system in use today. Group of answer choices Directory Services Active Directory LDAP LDAPS

Kerberos

It was accepted by Microsoft as the chosen authentication protocol for Windows 2000 and Active Directory domains that followed. Group of answer choices Layer 2 Tunneling Protocol (L2TP) Point-to-Point Tunneling Protocol (PPTP) Kerberos Tunneling

TOTP

It will only be valid for a predefined time interval. Group of answer choices TOTP HOTP TACACS SAML

Tunneling

Its protocol is one that encloses in its datagram another complete data packet that uses a different communications protocol. Group of answer choices Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) Tunneling Kerberos

Weak password

Johnnysoccer is a

Weak password

June111998 is a Group of answer choices None of the above Maybe Strong password Weak password

Strong password

K4T2ic9O is a Group of answer choices Weak password Strong password

Light Directory Access Protocol

LDAP stands for Group of answer choices Leader Development Action Plan Legal Deposit Advisory Panel Light Directory Access Protocol Lightweight Data Access Protocol

Certificate Life Cycle

Longer life cycles provide assailants an advantage in these stages. Group of answer choices Certificate Enrollment Certificate Life Cycle Certificate Validation Certificate Issuance

Strong password

Luv2sw!m is a Group of answer choices Strong password Weak password

Private Key Replacement Process

Obtain new key pair. Group of answer choices Private Key Restoration Methods Private Key Protection Methods None of the above Private Key Replacement Process

Public Key

PK stands for:

Private Key

PK stands for: Group of answer choices Public Kiosk Private King Pirate Key Private Key

Certificate Assemble

PKI Components except:

Weak password

Password is a

The client requests a session with the server.

Request in SSL Enrollment Process means

The server responds by sending its digital certificate and public key to the client.

Response in SSL Enrollment Process means

False

Telling your password to your parents is a good practice on security

Certificate Validation

The RADIUS server checks with the CA to confirm that the certificate is still valid and hasn't expired been revoked.

Privileged accounts

The applications only have access to specific functions and data based on their function and needs.

Public CA

These are companies that have garnered the trust of the public at large.

HOTP

These are gadgets that produce passwords based on a non-repeating one-way work.

Directory Services

These are software systems that store, organize and give get to directory information in order to bind together network assets. Group of answer choices Directory Services LDAP LDAPS Access control

Private CA

These are the best option if you only need to issue a limited number of certificates.

Group Policy Object

These are used for centralized management and configuration of the Active Directory environment.

Intermediate CA

They issue most certificates.

Digital certificate

This allows others to rely upon signatures or assertions made by the private key that corresponds to the public key that is certified. Group of answer choices Certificate authentication Digital certificate CA PKI

Key Management

This contrasts with key scheduling, which typically refers to the internal handling of keys within the operation of a cipher. Group of answer choices Public Key Key Management Certificate Authority Private Key

HSM

This device protects and manages digital keys and serves as the groundwork for building a secure enterprise PKI infrastructure. Group of answer choices CRL PKI Certificate Store HSM

Account Policy

This functionality is different than a group policy in Windows systems, which allows for an administrator to maintain consistent configuration and security settings set as group policy objects that activate when users log in. Group of answer choices Credential management Password complexity Account Policy Passwords

Certificate authentication

This permits others to depend upon marks or statements made by the private key that corresponds to the open key that's certified. Group of answer choices CA Digital certificate PKI Certificate authentication

False

Use any private information in your password. Group of answer choices False True

False

Use your street address as a password

SAML

Which of the following allows an application to securely authenticate a user by receiving credentials from a web domain?

SAML

Which of the following is commonly used for federated identity management across multiple organizations?

Short password

Which option is not a good trait for your password?

Short password

Which option is not a good trait for your password? Group of answer choices Long password Short password Different symbols within the password. No personal information

Private Key Protection Methods

it is a procedure never transmit on network. Group of answer choices Private Key Replacement Process Private Key Restoration Methods None of the above Private Key Protection Methods


Related study sets

Assessment: Workforce Planning: Recruitment and Selection

View Set

Greek and Latin tort meaning the act of twisting

View Set

Chapter 31 Continued - Perioperative Care

View Set

Chapter 13: The Spinal C13: The Spinal Cord and Nerves and Reflexes

View Set

Fabric Finishing and Aesthetic Finishes

View Set

Pharmacology Chapter 9 - Antiinfective Medications

View Set

6th Grade Science Mid-Term Exam Review

View Set

week 11 Patient Accounts & Practice Management Quiz

View Set