Which of the following would fall into the category of something the user is?
A.
Password
B.
Thumbprint
C.
Smartcard
D.
Signature - Answers Thumbprint
Which of the following is described as "when a person's identity is confirmed or verified through
the use of a specific system"? - Answers Authentication
You are installing a video monitoring system for your organization. You do not want any outside
people to view the video. What is the best solution? - Answers CCTV
In an 802.1X connection, the authenticator is software running on a workstation. - Answers
False
Authentication is when a person's identity is confirmed through the use of a specific system. -
Answers True
Which port does terminal services use? - Answers 3389
Identity proofing is an initial validation of an identity. - Answers True
Multifactor authentication is when a user can log in once and gain access to multiple systems. -
Answers False
Which of the following is the most secure?
A.
CHAP
, B.
MS-CHAP
C.
PAP
D.
MS-CHAP2 - Answers MS-CHAP2
Which of the following authentication methods is used more commonly on UNIX networks? -
Answers TACACS
A smart card is an example of something a user knows. - Answers False
Cisco created a proprietary version of EAP called LEAP. - Answers True
Authorization is when a person is in a state of being identified. - Answers False
Which of the following is when two or more types of authentication are used when dealing with
access control? - Answers Multifactor Authentication
An older type of door access system might use a proximity sensor. - Answers True
Which of the following are commonly used in VPN tunneling protocols? (Select the two best
answers.) - Answers 1.L2TP
2.PPTP
Which of the following uses a two-way authentication system known as mutual authentication?
- Answers Kerberos
A false positive is when a system authenticates a user who should not be allowed to access
that system. - Answers True
Biometrics is an example of a logical authentication system. - Answers False
One of the reasons to have job rotation implemented is to increase employee boredom -
Answers False
Least privilege is a concept that denies all traffic to a resource unless the user is specifically
granted access to that resource. - Answers False
Which of the following is the strongest password?
Thisisverysecure