10.2_Access Control Flashcards

1
Q

The simplest method of remote access authentication is to configure a login and password combination on ____

A

console, vty lines, and aux ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TRUE OR FALSE
The method of configuring the password and login is the easiest to implement, but it is also the weakest and least secure.

A

TRUE
This method provides no accountability and the password is sent in plaintext. Anyone with the password can gain entry to the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Code to implement password on console, vty lines, and aux

A

line vty 0 4
password cisco
login

line console 0 5
password cisco
login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ is a more secure form of remote acceass

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSH implementation codes

A

ip domain-name example.com
crypto generate rsa general-keys modulus 2048
username Admin secret Str0ng3rPa55word
ssh version 2
line vty 0 4
transport input ssh
login local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__ is a way to control who is permitted to access a network (authenticate), what they can do while they are there (authorize), and to audit what actions they performed while accessing the network (accounting).

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ are two common methods of implementing AAA authentication.

A

Local and server-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AUTHENTICATION
___ stores usernames and passwords locally in a network device such as the Cisco router. It is ideal for small networks

A

Local AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AUTHENTICATION
With the ___method, the router accesses a central AAA server.

A

server-based AAA Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Server-Based AAA Authentication

The router uses either the ___(RADIUS) or ___ (TACACS+) protocols to communicate with the AAA server

A

Remote Authentication Dial-In User Service
Terminal Access Controller Access Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ is automatic and does not require users to perform additional steps after authentication.

A

AAA Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

__ governs what users can and cannot do on the network after they are authenticated.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___uses a set of attributes that describes the user’s access to the network

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__ collects and reports usage data.

A

AAA accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The___ standard is a port-based access control and authentication protocol. This protocol restricts unauthorized workstations from connecting to a LAN through publicly accessible switch ports.

A

IEEE 802.1X

17
Q

802.1X

This is a device running 802.1X-compliant client software, which is available for wired or wireless devices.

A

Client (Supplicant)

18
Q

802.1X
The ____ acts as an intermediary between the client and the authentication server. It requests identifying information from the client, verifies that information with the authentication server, and relays a response to the client. Another device that could act as authenticator is a wireless access point.

A

Switch (Authenticator)

19
Q

802.1X
The ___validates the identity of the client and notifies the switch or wireless access point that the client is or is not authorized to access the LAN and switch services.

A

Authentication Server