Security Fundamentals Q/A's Flashcards Preview

Cisco CCNA Concepts & Theory > Security Fundamentals Q/A's > Flashcards

Flashcards in Security Fundamentals Q/A's Deck (32)
Loading flashcards...
1

What does TACACS+ stand for?

Terminal Access Controller Access Control System

2

What is does RADIUS stand for?

Remote Authentication Dial-In User Service

3

RADIUS encrypt what packet type from client to server?

access-request packet

4

TACACS+ encrypts the entire or partial body of each packet?

Does TACACS+ encrypt the header?

Encrypts the full content of each packet.

No, it does not include the header

5

802.1x is used for what?

What types of messages are allowed to a 802.1x port and which packets will be blocked?

Port Based Network Access Control

Only 802.1x messages are allowed to go thru the port all other packets will be blocked.

6

What does AAA server stand for?

Authorization, Authenticated and Accounting

7

What two protocols are commonly used in AAA server?

RADIUS and TACACS+

8

What protocol and port does TACACS+ use to communicate between the TACACS+ server?

TCP port 49

9

What's is created between two endpoints using a Virtual Private Network VPN?

A tunnel

10

What is a site-to-site VPN over a public network?

multiple fixed locations

11

What is a remote access VPN over a remote network?

secure VPN connection

12

What does Multi-Factor Authentication (2FA) use to identify users?

two or more authentication factors

13

What does a security certificate authenticate and identify?

reliability of a website or web application

14

What does biometric security use to identify uses?

physical biorecognition technology

15

What is malware software intentionally designed to do upon infection?

cause damage to server, network or computer

16

How does a DOS attack work?

floods the target with traffic until it crashes

17

What does an exploit use to take advantage of one's own system?

bugs or vulnerabilities.

18

What is ransomware?

malware that requires victims to make payment using cryptography to regain access their files or resources.

19

What is sphere-phishing?

targeted malware attack sent via email to a specific person or organization

20

What is a Phishing attack?

random malware attack via email links

21

What is a Trojan horse?

legitimate looking code designed to take control of your computer.

22

What is an SQL Injection?

malicious SQL entries injected to attack data-driven applications

23

What is a man in the middle attack?

something in the middle intercepting communication between two end-points

24

What are 802.1x authenticators?

L2 switches or Wireless Access Point (WAP).

25

What is a 802.1x authentication server used to validate?

client’s credentials

26

What is an example of a 802.1x supplicant or Client, which tries to access the network?

user machine (PC)

27

What is TACACS+ / RADIUS used for?

Centralize user access management

28

What requests do RADIUS servers receive and why?

user connection requests to authenticate users and return configuration information

29

What does RADIUS encrypt?

username and encrypted password

30

When 802.1x is enabled on a switch port what state will the port be in until user is connected to the port authenticated?

blocked state