100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

CNIT 242 Final Exam Questions with correct Answers

Beoordeling
-
Verkocht
-
Pagina's
50
Cijfer
A+
Geüpload op
05-08-2024
Geschreven in
2024/2025

Exam of 50 pages for the course CNIT at CNIT (CNIT 242 Final Exam)

Instelling
CNIT
Vak
CNIT











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CNIT
Vak
CNIT

Documentinformatie

Geüpload op
5 augustus 2024
Aantal pagina's
50
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Voorbeeld van de inhoud

CNIT 242 Final Exam

What does AAA stand for? - answer Authentication, Authorization, and Accounting

What question does Authentication answer? - answer Do you have the credentials
necessary to access this system?

What question does Authorization answer? - answer Once authenticated, what do you
have permission to do?

What question does Accounting answer? - answer Once authorized to access a
resource, how much of the resource are you using?

Authentication can be accomplished using any of what 4 qualifications? - answer What
you know, what you have, what you are, where you are

What is two-factor authentication? - answer Using two of the 4 authentication
qualifications to prove an identity.

What 2 steps does the authentication process involve? - answer Identification and proof
of identification

What are ways to provide identification? - answer User ID, physical object (such as
ATM card), biometrics, digital certificates

What are ways to provide proof of identification? - answer passwords, access codes,
one-time tokens, biometrics, digital certificates

What are strategic ways to develop user IDs? - answer computer generated (NEVER
simple names), sometimes created to some algorithm, NEVER use the same as email
address

True or False: UID / password combo can be a powerful method of authentication if
properly managed - answerTrue

What is the number one rule of password security? - answerDON'T WRITE
PASSWORDS DOWN

What is the security tradeoff with password? - answerThe more strict the password
rules, the higher the chances users will violate the first rule of secure passwords

,What are biometrics? - answerauthentication. functions as both ID and proof of ID,
separated into physiological and behavioral

What are digital certificates? - answera form of authentication. encrypted data files that
uses a Certificate Authority to guarantee the identity of the holder

What does RADIUS stand for and what does it provide? - answerRemote Access Dial-In
User Service, both Authentication and Authorization

What does TACAS+ stand for? - answerTerminal Access Controller Access Control
Service Plus

Where does authentication across the network exist? - answeron the local computer by
default, but in an enterprise environment, it will be on a different server

In a domain environment, what is authenticated against? - answerthe domain, not the
local machine

How is authorization accomplished? - answerthrough rights and permissions

What level do group policies assign rights to? - answersystem

What level do access control lists assign permissions to? - answerobject

What is an access control list? - answersimplest method of providing authorization, but
requires a separate authentication method. they are attached to/located on the resource

What do ACLs contain? - answera list of authorized users and their authorization levels

When do "share" permissions apply? - answerwhen the resource is accessed over a
network

What 3 servers does Kerberos require? - answerone authentication server, one ticket
granting server, and at least one application server

What is the basic concept of Kerberos? - answerIf a secret is known by only two people,
either person can verify the identity of the other by confirming that the other person
knows the secret.

What is the purpose of a Kerberos Realm? - answeradmins create the realms which
encompass all that is available to access. a realm defines what Kerberos manages in
terms of who can access what.

What is within a Kerberos Realm? - answerWithin the realm is the Client and the
service/host machine to which they requested access. There is also the Key Distribution
Center which hold the Authentication S and TGS

,In Kerberos, when requesting access to a service or host, three interactions take place
between you and: - answerthe Authentication Server, the Ticket Granting Server, and
the Service or host machine that you're wanting access to

What will you receive with each interaction in Kerberos? - answerTwo messages. Each
message is one that you can decrypt, and one that you can not.

In Kerberos, does the service/machine you are requesting access to communicate
directly with the KDC? - answerNo, they do not!

Where are all the secret keys for user machines and services stored in Kerberos? -
answerthe KDC

What are secret keys (in Kerberos)? - answerpasswords plus a salt that are hashed

True or False: There are passwords on the services/host machines that use Kerberos. -
answerFalse

What happens during the set up of Kerberos? - answerhash algorithm is chosen for
secret keys, admin choses a key for the service/host machine to memorize

What type of cryptography does Kerberos use? - answersymmetric/private key, but can
be configured to use public key

How is the KDC protected? - answerit itself is encrypted with a master key

What are traits of TACAS? - answerCisco-proprietary, TCP, AAA are separate
processes

What are traits of RADIUS? - answerOpen standard, UDP, combines Authentication
and Authorization, only encrypts password

What are traits of Kerberos? - answerAuthentication only, no Authorization or
Accounting

What standard does naming in AD follow? - answerLDAP standard

What needs to be formed among domain trees (explicitly or implicitly) to build a domain
forest? - answertrust relationships

Does creating AD groups as "Universal" maximize performance? - answerno, it does
not maximize

When is the Authoritative DNS server contacted? - answerWhen the configured DNS
server does not have the record in its database/cache

, Can users access their files when not connected to the network using Roaming User
Profiles? - answerNo, that's not what roaming profiles do

What is the order in which group policies are applied? - answerlocal, site, domain, OU

T/F: leaf objects can inherit attributes from its parent containers - answerT

T/F: X.500 is the original basis for Kerberos - answerF

What resource can provide centralized user authentication, and enables a general
"phone book" about network users? - answera directory

Does AD use LDAP to do Authentication and Authorization? - answerno...just
authorization

What is a directory? - answera centralized, hierarchical information repository about
objects in an IT system

What types of objects does a directory organize and centralize information about? -
answerusers, groups, devices, servers, external applications

What are directory services? - answerProtocols, functions, and APIs that allow access
to directory information, the benefit provided by the directory to the users

Can a directory be used as the basis for single sign on? - answeryeah boi it can

Tr/Fa: a directory provides for granularity of administration through its hierarchical
grouping structure - answerTr

What logical view is a directory organized into? What are the 3 main components? -
answera "tree". root, branch and leaf

What are the two ways a directory can be arranged/organized? - answergeographic or
functional

What is pruning and grafting? - answermoving items in the directory to new locations,
such as individual users, groups, computers, or even whole sections of the directory

What are attributes? - answerVariables with values that are relevant to items in that part
of the directory

Why do items inherit attributes based on their location in the directory? - answerEnsures
consistency across items within a directory location

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
julianah420 Phoenix University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
657
Lid sinds
2 jaar
Aantal volgers
324
Documenten
33952
Laatst verkocht
1 dag geleden
NURSING,TESTBANKS,ASSIGNMENT,AQA AND ALL REVISION MATERIALS

On this page, you find all documents, package deals, and flashcards offered by seller julianah420

4.3

149 beoordelingen

5
101
4
20
3
8
2
5
1
15

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen