Module 13 - Authentication Methods & Services - Q&A Flashcards

1
Q
Which of the following allows a user to use one set of credentials throughout an enterprise?
A. TACACS
B. RADIUS
C. Single Sign-on
D. TACACS +
A

C. Single sign-on allows a user to use one set of credentials throughout an enterprise to access various resources without having to reauthenticate with a different set of credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following would use a SHA-2 algorithm to generate a password that is used for only one session?
A. Kerberos Authentication Service
B. HOTP
C. TOTP
D. Kerberos Ticket-Granting Service
A

B. The HMAC-based One-Time Password (HOTP) algorithm uses hashing algorithms, such as SHA, to generate one-time passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following authentication protocols sends user and password information in clear text?
A. PAP
B. CHAP
C. MS-CHAP v2
D. MS-CHAP
A

A. The Password Authentication Protocol (PAP) sends user and password information in clear text and should not be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following authentication protocols was the first of its kind to offer challenge-response mechanisms for protecting user credentials sent over a network?
A. PPP
B. Kerberos
C. PAP
D. CHAP
A

D. The Challenge Handshake Authentication Protocol (CHAP) was the first authentication protocol designed to offer challenge-response mechanisms for protecting user credentials sent over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Under which of the following circumstances would a Windows host use Kerberos instead of NTLM v2 to authenticate users?
A. Authenticating to a server using only an IP address
B. Authenticating to a modern Windows Active Directory domain
C. Authenticating to a different Active Directory forest with legacy trusts enabled
D. Authenticating to a server in a Windows workgroup

A

B. When authenticating to a modern Windows Active Directory domain, Windows uses Kerberos as its authentication protocol by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following issues a service ticket to a user in a Kerberos realm?
A. Authentication Service
B. Server Service
C. Ticket-Granting Service
D. Key Distribution Center
A

C. The Ticket-Granting Service issues a service ticket to a user in a Kerberos realm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following remote authentication protocols uses UDP ports 1812 and 1813?
A. L2TP
B. TACACS +
C. TACACS
D. RADIUS
A

D. RADIUS uses UDP ports 1812 and 1813.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All of the following are characteristics of the RADIUS authentication protocol, except:
A. It encrypts data between the RADIUS client and the remote host.
B. It uses UDP port 1812 for authentication and authorization.
C. It supports both PAP and CHAP.
D. The RADIUS client is the network access server that requests authentication information from the RADIUS server.

A

A. RADIUS does not encrypt data between the RADIUS client and the remote host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following remote authentication protocols can use both Kerberos and EAP, as well as multifactor authentication?
A. RADIUS
B. TACACS +
C. TACACS
D. PPTP
A

B. TACACS + supports both Kerberos and EAP, as well as multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are characteristics of the Point-to-Point Tunneling Protocol (PPTP)? (Choose two.)
A. Uses TCP port 1723
B. Uses TCP port 1701
C. Uses MPPE as its encryption protocol
D. Uses IPsec as its encryption protocol Answers

A

A, C. PPTP uses TCP port 1723 as well as MPPE for its security protocol and encryption mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly