CNIT 242 FINAL EXAM | 486 ACTUAL
QUESTIONS AND ANSWERS WITH
COMPLETE SOLUTIONS 100%
CORRECT | 2025 UPDATE
What does AAA stand for? - ANSWER Authentication, Authorization, and
Accounting
What question does Authentication answer? - ANSWER Do you have the
credentials necessary to access this system?
What question does Authorization answer? - ANSWER Once authenticated,
what do you have permission to do?
What question does Accounting answer? - ANSWER Once authorized to access
a resource, how much of the resource are you using?
Authentication can be accomplished using any of what 4 qualifications? -
ANSWER What you know, what you have, what you are, where you are
What is two-factor authentication? - ANSWER Using two of the 4
authentication qualifications to prove an identity.
,What 2 steps does the authentication process involve? - ANSWER Identification
and proof of identification
What are ways to provide identification? - ANSWER User ID, physical object
(such as ATM card), biometrics, digital certificates
What are ways to provide proof of identification? - ANSWER passwords, access
codes, one-time tokens, biometrics, digital certificates
What are strategic ways to develop user IDs? - ANSWER computer generated
(NEVER simple names), sometimes created to some algorithm, NEVER use the
same as email address
True or False: UID / password combo can be a powerful method of authentication
if properly managed - ANSWER True
What is the number one rule of password security? - ANSWER DON'T WRITE
PASSWORDS DOWN
What is the security tradeoff with password? - ANSWER The more strict the
password rules, the higher the chances users will violate the first rule of secure
passwords
What are biometrics? - ANSWER authentication. functions as both ID and proof
of ID, separated into physiological and behavioral
,What are digital certificates? - ANSWER a form of authentication. encrypted
data files that uses a Certificate Authority to guarantee the identity of the holder
What does RADIUS stand for and what does it provide? - ANSWER Remote
Access Dial-In User Service, both Authentication and Authorization
What does TACAS+ stand for? - ANSWER Terminal Access Controller Access
Control Service Plus
Where does authentication across the network exist? - ANSWER on the local
computer by default, but in an enterprise environment, it will be on a different
server
In a domain environment, what is authenticated against? - ANSWER the
domain, not the local machine
How is authorization accomplished? - ANSWER through rights and permissions
What level do group policies assign rights to? - ANSWER system
What level do access control lists assign permissions to? - ANSWER object
, What is an access control list? - ANSWER simplest method of providing
authorization, but requires a separate authentication method. they are attached
to/located on the resource
What do ACLs contain? - ANSWER a list of authorized users and their
authorization levels
When do "share" permissions apply? - ANSWER when the resource is accessed
over a network
What 3 servers does Kerberos require? - ANSWER one authentication server,
one ticket granting server, and at least one application server
What is the basic concept of Kerberos? - ANSWER If a secret is known by only
two people, either person can verify the identity of the other by confirming that
the other person knows the secret.
What is the purpose of a Kerberos Realm? - ANSWER admins create the realms
which encompass all that is available to access. a realm defines what Kerberos
manages in terms of who can access what.
What is within a Kerberos Realm? - ANSWER Within the realm is the Client and
the service/host machine to which they requested access. There is also the Key
Distribution Center which hold the Authentication S and TGS
QUESTIONS AND ANSWERS WITH
COMPLETE SOLUTIONS 100%
CORRECT | 2025 UPDATE
What does AAA stand for? - ANSWER Authentication, Authorization, and
Accounting
What question does Authentication answer? - ANSWER Do you have the
credentials necessary to access this system?
What question does Authorization answer? - ANSWER Once authenticated,
what do you have permission to do?
What question does Accounting answer? - ANSWER Once authorized to access
a resource, how much of the resource are you using?
Authentication can be accomplished using any of what 4 qualifications? -
ANSWER What you know, what you have, what you are, where you are
What is two-factor authentication? - ANSWER Using two of the 4
authentication qualifications to prove an identity.
,What 2 steps does the authentication process involve? - ANSWER Identification
and proof of identification
What are ways to provide identification? - ANSWER User ID, physical object
(such as ATM card), biometrics, digital certificates
What are ways to provide proof of identification? - ANSWER passwords, access
codes, one-time tokens, biometrics, digital certificates
What are strategic ways to develop user IDs? - ANSWER computer generated
(NEVER simple names), sometimes created to some algorithm, NEVER use the
same as email address
True or False: UID / password combo can be a powerful method of authentication
if properly managed - ANSWER True
What is the number one rule of password security? - ANSWER DON'T WRITE
PASSWORDS DOWN
What is the security tradeoff with password? - ANSWER The more strict the
password rules, the higher the chances users will violate the first rule of secure
passwords
What are biometrics? - ANSWER authentication. functions as both ID and proof
of ID, separated into physiological and behavioral
,What are digital certificates? - ANSWER a form of authentication. encrypted
data files that uses a Certificate Authority to guarantee the identity of the holder
What does RADIUS stand for and what does it provide? - ANSWER Remote
Access Dial-In User Service, both Authentication and Authorization
What does TACAS+ stand for? - ANSWER Terminal Access Controller Access
Control Service Plus
Where does authentication across the network exist? - ANSWER on the local
computer by default, but in an enterprise environment, it will be on a different
server
In a domain environment, what is authenticated against? - ANSWER the
domain, not the local machine
How is authorization accomplished? - ANSWER through rights and permissions
What level do group policies assign rights to? - ANSWER system
What level do access control lists assign permissions to? - ANSWER object
, What is an access control list? - ANSWER simplest method of providing
authorization, but requires a separate authentication method. they are attached
to/located on the resource
What do ACLs contain? - ANSWER a list of authorized users and their
authorization levels
When do "share" permissions apply? - ANSWER when the resource is accessed
over a network
What 3 servers does Kerberos require? - ANSWER one authentication server,
one ticket granting server, and at least one application server
What is the basic concept of Kerberos? - ANSWER If a secret is known by only
two people, either person can verify the identity of the other by confirming that
the other person knows the secret.
What is the purpose of a Kerberos Realm? - ANSWER admins create the realms
which encompass all that is available to access. a realm defines what Kerberos
manages in terms of who can access what.
What is within a Kerberos Realm? - ANSWER Within the realm is the Client and
the service/host machine to which they requested access. There is also the Key
Distribution Center which hold the Authentication S and TGS