Filters
Question type

Study Flashcards

RADIUS is a remote authentication protocol the uses UDP port 1812.

Correct Answer

verifed

verified

_______________ is an authentication process by which the user can enter a single user ID and password then move from application to application or resource to resource without having to supply further authentication information.

Correct Answer

verifed

verified

The two protocols used in IPSec to provide traffic security are _________ and __________.

Correct Answer

verifed

verified

Authentication Heade...

View Answer

_______________ describes a process in which each side of an electronic communication verifies the authenticity of the other.

Correct Answer

verifed

verified

Mutual aut...

View Answer

Which of the following protocols involves a three-way handshake and uses a shared secret key for communication?


A) PAP
B) CHAP
C) TCP
D) S/Telnet

Correct Answer

verifed

verified

Which of the following protocols involves a two-way handshake in which the username and password are sent across the link in clear text?


A) PAP
B) SSH
C) EAP
D) CHAP

Correct Answer

verifed

verified

TACACS+ uses


A) UDP port 49 and TCP port 50 for login
B) UDP port 49 and TCP port 49 for login
C) UDP port 49 and UDP port 50 for login
D) TCP port 49 and UDP port 50 for login

Correct Answer

verifed

verified

What are the three types of accounting records in TACACS+?


A) Availability,Accounting,Confidentiality
B) Availability,Integrity,Confidentiality
C) Start,Stop,Update
D) Start,Stop,Delete

Correct Answer

verifed

verified

TACACS+ is a client/server protocol that uses IP as its transport protocol.

Correct Answer

verifed

verified

Which type of access control would allow the company to restrict employee access to the payroll file after hours or on weekends?


A) Mandatory access control
B) Discretionary access control
C) Role-based access control
D) Rule-based access control

Correct Answer

verifed

verified

What does RADIUS stand for?


A) Real Access Device Invisible Users Solution
B) Rational Available Device Incremental Users Service
C) Remote Authentication Dial-In User Service
D) Remote Authentication Device Invisible Users Solution

Correct Answer

verifed

verified

_______________ authentication is a term that describes the use of more than one authentication mechanism at the same time.

Correct Answer

verifed

verified

RADIUS uses


A) TCP port 1812 for authentication and TCP port 1813 for accounting
B) TCP port 1812 for accounting and TCP port 1813 for authentication
C) UDP port 1812 for authentication and UDP port 1813 for accounting
D) UDP port 1812 for accounting and UDP port 1813 for authentication

Correct Answer

verifed

verified

One of the fundamental design aspects of TACACS+ is the separation of authentication,authorization,and accounting.

Correct Answer

verifed

verified

Which of the following types of access control would you use to grant permissions based on the decision of the owner of an object?


A) Mandatory access control
B) Discretionary access control
C) Role-based access control
D) Rule-based access control

Correct Answer

verifed

verified

________ is the encapsulation of one packet within another.It allows you to hide the original packet from view.

Correct Answer

verifed

verified

_______________ is the granting of specific permissions based on the privileges held by the account.

Correct Answer

verifed

verified

The 802.1x standard is for a protocol to support communications between a user and a(n)


A) Authorization device
B) Available device
C) Serial device
D) Another user

Correct Answer

verifed

verified

With IPsec,security associations are used to establish the logical set of security parameters designed to facilitate the sharing of information between entities.The security association protects


A) Confidentiality
B) Integrity and confidentiality
C) Confidentiality and availability
D) Integrity and availability

Correct Answer

verifed

verified

Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects?


A) Mandatory access control
B) Discretionary Access Control
C) Role-based access control
D) Rule-based access control

Correct Answer

verifed

verified

Showing 21 - 40 of 46

Related Exams

Show Answer