DCOM 258 FINAL QUESTIONS AND ANSWERS
Which of the following would fall into the category of something the user is?
A.
Password
B.
Thumbprint
C.
Smartcard
D.
Signature - Answers - Thumbprint
Which of the following is described as "when a person's identity is confirmed or verified
through the use of a specific system"? - Answers - Authentication
You are installing a video monitoring system for your organization. You do not want any
outside people to view the video. What is the best solution? - Answers - CCTV
In an 802.1X connection, the authenticator is software running on a workstation. -
Answers - False
Authentication is when a person's identity is confirmed through the use of a specific
system. - Answers - True
Which port does terminal services use? - Answers - 3389
Identity proofing is an initial validation of an identity. - Answers - True
Multifactor authentication is when a user can log in once and gain access to multiple
systems. - Answers - False
Which of the following is the most secure?
A.
CHAP
B.
MS-CHAP
C.
PAP
D.
MS-CHAP2 - Answers - MS-CHAP2
Which of the following authentication methods is used more commonly on UNIX
networks? - Answers - TACACS
, A smart card is an example of something a user knows. - Answers - False
Cisco created a proprietary version of EAP called LEAP. - Answers - True
Authorization is when a person is in a state of being identified. - Answers - False
Which of the following is when two or more types of authentication are used when
dealing with access control? - Answers - Multifactor Authentication
An older type of door access system might use a proximity sensor. - Answers - True
Which of the following are commonly used in VPN tunneling protocols? (Select the two
best answers.) - Answers - 1.L2TP
2.PPTP
Which of the following uses a two-way authentication system known as mutual
authentication? - Answers - Kerberos
A false positive is when a system authenticates a user who should not be allowed to
access that system. - Answers - True
Biometrics is an example of a logical authentication system. - Answers - False
One of the reasons to have job rotation implemented is to increase employee boredom -
Answers - False
Least privilege is a concept that denies all traffic to a resource unless the user is
specifically granted access to that resource. - Answers - False
Which of the following is the strongest password?
Thisisverysecure
B.
Marqu1sD3S0d
C.
This1sV#ryS3cure
D.
|ocrian# - Answers - This1sV#ryS3cure
Separation of duties is when more than one person is required to complete a task. -
Answers - True
Lattice-based access control is an example of what type of access control policy? -
Answers - MAC
Which of the following would fall into the category of something the user is?
A.
Password
B.
Thumbprint
C.
Smartcard
D.
Signature - Answers - Thumbprint
Which of the following is described as "when a person's identity is confirmed or verified
through the use of a specific system"? - Answers - Authentication
You are installing a video monitoring system for your organization. You do not want any
outside people to view the video. What is the best solution? - Answers - CCTV
In an 802.1X connection, the authenticator is software running on a workstation. -
Answers - False
Authentication is when a person's identity is confirmed through the use of a specific
system. - Answers - True
Which port does terminal services use? - Answers - 3389
Identity proofing is an initial validation of an identity. - Answers - True
Multifactor authentication is when a user can log in once and gain access to multiple
systems. - Answers - False
Which of the following is the most secure?
A.
CHAP
B.
MS-CHAP
C.
PAP
D.
MS-CHAP2 - Answers - MS-CHAP2
Which of the following authentication methods is used more commonly on UNIX
networks? - Answers - TACACS
, A smart card is an example of something a user knows. - Answers - False
Cisco created a proprietary version of EAP called LEAP. - Answers - True
Authorization is when a person is in a state of being identified. - Answers - False
Which of the following is when two or more types of authentication are used when
dealing with access control? - Answers - Multifactor Authentication
An older type of door access system might use a proximity sensor. - Answers - True
Which of the following are commonly used in VPN tunneling protocols? (Select the two
best answers.) - Answers - 1.L2TP
2.PPTP
Which of the following uses a two-way authentication system known as mutual
authentication? - Answers - Kerberos
A false positive is when a system authenticates a user who should not be allowed to
access that system. - Answers - True
Biometrics is an example of a logical authentication system. - Answers - False
One of the reasons to have job rotation implemented is to increase employee boredom -
Answers - False
Least privilege is a concept that denies all traffic to a resource unless the user is
specifically granted access to that resource. - Answers - False
Which of the following is the strongest password?
Thisisverysecure
B.
Marqu1sD3S0d
C.
This1sV#ryS3cure
D.
|ocrian# - Answers - This1sV#ryS3cure
Separation of duties is when more than one person is required to complete a task. -
Answers - True
Lattice-based access control is an example of what type of access control policy? -
Answers - MAC