quiz 8 Flashcards

1
Q

Authentication is when a person’s identity is confirmed through the use of a specific system.

A

True—Authentication is when a person’s identity is confirmed or verified through the use of a specific system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorization is when a person is in a state of being identified.

A

False—Authorization is when a user is given permission to access certain resources. Identification is when a person is in a state of being identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A smart card is an example of something a user knows.

A

. False—A smart card would be an example of something a user has. A password would be an example of something a user knows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identity proofing is an initial validation of an identity.

A

True—Identity proofing is an initial validation of an identity—for example, when people shows their ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An older type of door access system might use a proximity sensor.

A

True—Proximity sensors are used in many door access systems, although they are less secure than other available technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biometrics is an example of a logical authentication system.

A

False—Biometrics is the science of recognizing humans based on one or more physical characteristics. An example of a logical authentication system would be Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multifactor authentication is when a user can log in once and gain access to multiple
systems.

A

False—Multifactor authentication is when two or more types of authentication are used when dealing with a user attempting to access a system. Single sign-on is when a user can log in once yet gain access to multiple systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A false positive is when a system authenticates a user who should not be allowed to access that system.

A

True—A false positive is an authentication failure that enables a user access who should not be allowed to get in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

. In an 802.1X connection, the authenticator is software running on a workstation.

A

False—Software running on the workstation would be known as a supplicant. The authenticator is usually a wireless access point or switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cisco created a proprietary version of EAP called LEAP.

A

True—Cisco created LEAP (lightweight EAP), which is proprietary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following uses a two-way authentication system known as mutual authentication? 
A. LDAP 
B. Kerberos 
C. RADIUS 
D. 802.1X
A

B. Kerberos is an authentication protocol used in client/server environments, where each verifies the other’s identity, known as mutual authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following commands enables you to synchronize a client’s time to a domain controller? 
A. net time 
B. netstat –an 
C. net stop 
D. sc config
A

A. Net time is the command you would use to synchronize time on a client computer to a domain controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which port does terminal services use? 
A. 1812 
B. 389 
C. 3389 
D. 1813
A

C. Terminal services uses Port 3389. RADIUS uses Port 1812 and 1813. LDAP uses Port 389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following is the most secure? 
A. PAP 
B. CHAP 
C. MS-CHAP 
D. MS-CHAP2
A

D. MS-CHAP2 is the most secure authentication protocol listed. PAP is not secure at all because it sends passwords in clear text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following are commonly used in VPN tunneling protocols? (Select the two best answers.) 
A. PPP 
B. PPTP 
C. TACACS 
D. L2TP
A

B and D. PPTP and L2TP are commonly used in VPN tunneling protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following authentication methods is used more commonly on UNIX networks? 
A. 802.1X 
B. TACACS 
C. RADIUS 
D. Kerberos
A

B. TACACS (Terminal Access Controller Access Control System) is more commonly found in UNIX networks; it is considered more reliable than RADIUS.

17
Q
Which of the following is described as "when a person's identity is confirmed or verified through the use of a specific system"? 
A. Identification 
B. Authorization 
C. Authentication 
D. Access control
A

C. Authentication is when a person’s identity is confirmed or verified through the use of a specific system.

18
Q
Which of the following would fall into the category of something the user is? 
A. Password 
B. Smartcard 
C. Signature 
D. Thumbprint
A

D. A thumbprint would be an example of something the user is; it is one example of biometrics.

19
Q
You are installing a video monitoring system for your organization. You do not want any outside people to view the video. What is the best solution? 
A. CCTV 
B. IP-based video cameras 
C. Motion detectors 
D. WebCam
A

A. CCTV (closed circuit television) is the best solution if you don’t want anyone else to view your video.

20
Q
Which of the following is when two or more types of authentication are used when dealing with access control? 
A. Single sign-on 
B. False positive 
C. Multifactor authentication
D. Username and password
A

C. Multifactor authentication is when two or more types of authentication are used when dealing with user access control—for example, if a person needs to use a username and password and swipes a smart card.