100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CNIT 242 FINAL EXAM | 486 ACTUAL QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS 100% CORRECT | 2025 UPDATE

Rating
-
Sold
-
Pages
98
Grade
A+
Uploaded on
13-03-2025
Written in
2024/2025

CNIT 242 FINAL EXAM | 486 ACTUAL QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS 100% CORRECT | 2025 UPDATE

Institution
CNIT 242
Course
CNIT 242











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CNIT 242
Course
CNIT 242

Document information

Uploaded on
March 13, 2025
Number of pages
98
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CNIT 242 FINAL EXAM | 486 ACTUAL
QUESTIONS AND ANSWERS WITH
COMPLETE SOLUTIONS 100%
CORRECT | 2025 UPDATE


What does AAA stand for? - ANSWER Authentication, Authorization, and
Accounting



What question does Authentication answer? - ANSWER Do you have the
credentials necessary to access this system?



What question does Authorization answer? - ANSWER Once authenticated,
what do you have permission to do?



What question does Accounting answer? - ANSWER Once authorized to access
a resource, how much of the resource are you using?


Authentication can be accomplished using any of what 4 qualifications? -
ANSWER What you know, what you have, what you are, where you are



What is two-factor authentication? - ANSWER Using two of the 4
authentication qualifications to prove an identity.

,What 2 steps does the authentication process involve? - ANSWER Identification
and proof of identification



What are ways to provide identification? - ANSWER User ID, physical object
(such as ATM card), biometrics, digital certificates



What are ways to provide proof of identification? - ANSWER passwords, access
codes, one-time tokens, biometrics, digital certificates



What are strategic ways to develop user IDs? - ANSWER computer generated
(NEVER simple names), sometimes created to some algorithm, NEVER use the
same as email address


True or False: UID / password combo can be a powerful method of authentication
if properly managed - ANSWER True



What is the number one rule of password security? - ANSWER DON'T WRITE
PASSWORDS DOWN



What is the security tradeoff with password? - ANSWER The more strict the
password rules, the higher the chances users will violate the first rule of secure
passwords



What are biometrics? - ANSWER authentication. functions as both ID and proof
of ID, separated into physiological and behavioral

,What are digital certificates? - ANSWER a form of authentication. encrypted
data files that uses a Certificate Authority to guarantee the identity of the holder



What does RADIUS stand for and what does it provide? - ANSWER Remote
Access Dial-In User Service, both Authentication and Authorization



What does TACAS+ stand for? - ANSWER Terminal Access Controller Access
Control Service Plus



Where does authentication across the network exist? - ANSWER on the local
computer by default, but in an enterprise environment, it will be on a different
server



In a domain environment, what is authenticated against? - ANSWER the
domain, not the local machine



How is authorization accomplished? - ANSWER through rights and permissions



What level do group policies assign rights to? - ANSWER system



What level do access control lists assign permissions to? - ANSWER object

, What is an access control list? - ANSWER simplest method of providing
authorization, but requires a separate authentication method. they are attached
to/located on the resource



What do ACLs contain? - ANSWER a list of authorized users and their
authorization levels



When do "share" permissions apply? - ANSWER when the resource is accessed
over a network



What 3 servers does Kerberos require? - ANSWER one authentication server,
one ticket granting server, and at least one application server



What is the basic concept of Kerberos? - ANSWER If a secret is known by only
two people, either person can verify the identity of the other by confirming that
the other person knows the secret.



What is the purpose of a Kerberos Realm? - ANSWER admins create the realms
which encompass all that is available to access. a realm defines what Kerberos
manages in terms of who can access what.



What is within a Kerberos Realm? - ANSWER Within the realm is the Client and
the service/host machine to which they requested access. There is also the Key
Distribution Center which hold the Authentication S and TGS

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StudySet Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2545
Member since
5 year
Number of followers
1734
Documents
16853
Last sold
3 days ago
STUDYSET WILL HELP YOU EARN A TOP SCORE ON YOUR EXAMS

avoid resits and achieve higher grades with Aplus satisfying exams,study guide,class notes and textbook notes

4.0

605 reviews

5
312
4
106
3
97
2
26
1
64

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions