100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CNIT 242 EXAM 1 QUESTIONS AND ANSWERS

Puntuación
-
Vendido
-
Páginas
8
Grado
A+
Subido en
10-11-2025
Escrito en
2025/2026

CNIT 242 EXAM 1 QUESTIONS AND ANSWERS

Institución
CNIT 242
Grado
CNIT 242









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CNIT 242
Grado
CNIT 242

Información del documento

Subido en
10 de noviembre de 2025
Número de páginas
8
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CNIT 242 EXAM 1 QUESTIONS AND ANSWERS

3 A's - Answer -Authorization, Accounting, Authentication

What can you use to accomplish authentication? - Answer -What you know, what you
have, what you are, where you are

What are the two basic parts of authentication? - Answer -Who you are, and proof that
you are who you say you are (ID & Proof of ID)

Examples of Identification - Answer -User ID, physical object (ATM card), biometrics,
digital certificates

Examples of Proof of Identification - Answer -Password, access code, one-time token,
biometrics, digital certificates

T/F: It is good practice for user ID to be the same as email address. - Answer -False

Rules of passwords - Answer -1. Don't write them down!
Avoid easy to guess passwords, do not let them contain account name or display name,
force periodic password changes between 30 days-1 year, disallow last x passwords,
use non-alpha characters, disallow plain English passwords.

protocols to enable communication for authentication - Answer -Domain logon, RADIAS
(Remote Authentication Dial In User Service), TACACS+ (Terminal Access Controller
Access Control System)

Define authorization - Answer -Users should only be allowed to access resources that
they are supposed to be able to access.

T/F: it is best to assign rights and permissions to groups rather than to individual users.
- Answer -True

What is an ACL? - Answer -Access control list, simplest method of providing
authorization. Contain a list of authorized users and their authorization level, are
attached to individual resources. Used in Windows.

T/F: Kerberos, by default, uses public-key cryptography. - Answer -False. Kerberos can
be configured to use public-key cryptography, but is typically reliant on symmetric key
cryptography.

In Kerberos, what is a KDC? - Answer -Key Distribution Center: stores all of the secret
keys for user machines and services in its database.

, T/F: In Kerberos, the KDC and the machine you request access to communicate
directly. - Answer -False

What is Accounting? - Answer -Once authorized to access a resource, how much of the
resource are you using?

Define directory - Answer -A directory is a centralized, hierarchical information
repository about objects in an IT system. Functions to organize and centralize info and
objects.

What is Directory Services? - Answer -Protocols, functions, and APIs that allow access
to directory information

What is DAP? What is LDAP? - Answer -DAP: Directory Access Protocol; LDAP:
Lightweight Directory Access Protocol

What are some functions of a directory? - Answer -Provides centralized authentication;
enables a generic "phone book" about network users; provides granularity of
administration

How is a directory structured? - Answer -Uses a hierarchical grouping structure:
arranged in a tree fashion with root, branch, leaf.

How are resources distinguished in the directory structure? - Answer -Via their position
in the directory tree. Uniqueness of name is limited to a single location.

How are directories typically arranged? - Answer -Either geographically or functionally
(both are fine, some use both)

What does pruning and grafting refer to? - Answer -Items in a directory can be moved
to new locations in the directory. Any item can be moved except the root (users, groups,
computers, whole sections of the directory)

T/F: if an item in a directory is moved from one location to another, it loses its old
inherited attributes and gains new ones. - Answer -True

What is a leaf in directory structure? - Answer -Any object that cannot contain other
objects in the directory (e.g., person, computer, printer)

What is a directory enabled application? - Answer -Core application that relies on the
directory for information (like user logon, VPN authentication, etc)

What is a distinguished name? - Answer -DN is used to refer to individual entries in a
directory.
$13.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Thumbnail
Package deal
CNIT 242 BUNDLED EXAMS
-
23 2025
$ 322.77 Más información

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
GEEKA YALA UNIVERSITY
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2009
Miembro desde
3 año
Número de seguidores
1447
Documentos
48320
Última venta
21 horas hace

3.8

345 reseñas

5
172
4
61
3
44
2
16
1
52

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes