IT Security: Defense against the digital dark arts Questions and Answers Rated A
IT Security: Defense against the digital dark arts Questions and Answers Rated A Authn is short for ________. Authentication. Authz (Authorization) Authorization is concerned with determining ______ to resources. access. Authorization deals with determining access to resources In addition to the client being authenticated by the server, certificate authentication also provides ______. Server authentication. The client will validate the server's certificate, thereby providing server authentication and client authentication. Kerberos uses _____ as authentication tokens. Tickets. Kerberos issues tickets, which represent authentication and authorization tokens Your bank set up multifactor authentication to access your account online. You know your password. What other factor combined with your password qualifies for multifactor authentication? Check all that apply. Fingerprint Bank Card A Lightweight Directory Access Protocol (LDAP) uses a _____ structure to hold directory objects. Data Information Tree. A Lightweight Directory Access Protocol (LDAP) uses a Data Information Tree structure to hold directory objects. What is used to request access to services in the Kerberos process? TGT Multiple client switches and routers have been set up at a small military base. The network team decided to implement Terminal Access Controller Access-Control System Plus (TACACS+),along with Kerberos, and an external Lightweight Directory Access Protocol (LDAP) service. What is the primary reason TACACS+ was chosen for this? Device Administration. TACACS+ is primarily used for device administration
Written for
- Institution
- IT SECURITY
- Course
- IT SECURITY
Document information
- Uploaded on
- April 15, 2024
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
it security defense against the digital dark arts
Also available in package deal