Rated A+
Which of the following can function as a RADIUS client? (Choose all that apply.)
a. A VPN server
b. An unmanaged switch
c. A wireless access point
d. A dial-in server - Answers a. A VPN server
c. A wireless access point
d. A dial-in server
Which authentication methods does NPS use? (Choose all that apply.)
a. Passwords
b. Smart cards
c. Certificates
d. Biometrics - Answers a. Passwords
c. Certificates
What is the maximum size of a shared secret?
a. 128 characters
b. 64 characters
c. 32 characters
d. 256 characters - Answers a. 128 characters
What client authentication method can PEAP use? (Choose all that apply.)
a. Passwords
b. Certificates
c. Biometrics
d. None of the above - Answers a. Passwords
b. Certificates
, What criteria can a RADIUS proxy use to determine where to forward a request? (Choose all that apply.)
a. The priority assigned the server
b. The weight assigned the server
c. The availability of the server
d. The IP address of the server - Answers a. The priority assigned the server
b. The weight assigned the server
c. The availability of the server
To what formats does RADIUS accounting write? (Choose all that apply.)
a. Event log
b. SQL Server
c. RADIUS accounting format
d. Text file - Answers a. Event log
b. SQL Server
d. Text file
What do connection request policies specify?
a. Which RADIUS servers handle connection requests from RADIUS clients
b. Which users and groups can connect, what times they can access the network, and what conditions
apply
c. a and b
d. None of the above - Answers a. Which RADIUS servers handle connection requests from RADIUS
clients
What do network policies specify?
a. Which RADIUS servers handle connection requests from RADIUS clients
b. Which users and groups can connect, what times they can access the network, and what conditions
apply
c. a and b