Chapter 8: Identity and Access Management Questions with 100% Correct Answers | Verified
This is the ongoing management of the rights of users is called - privilege management IAM - Identity and Access Management LDAP - Lightweight Directory Access Protocol This is the most common choice of LDAP implementations - OpenLDAP This is a Cisco-designed authentication protocol, that uses TCP to provide authentication, authorization, and accounting services -TACACS+ TACACS+ has encryption flaws so it should only be run on ________________________________ administrative networks - isolated This is one of the most common AAA systems for network devices, wireless networks, and other services; it can operate via TCP or UDP and operates in a client-server model. - RADIUS RADIUS passwords are obfuscated by a shared secret and MD5 hash, so they are not very strongly protected, so RADIUS traffic between the RADIUS network access server and the RADIUS server is typically encrypted using __________________ tunnels. - IPSec This protocol is designed to be used on untrusted networks and uses encryption to protect its authentication traffic. It uses Ticket Granting Tickets in its process. - Kerberos Active Directory (AD) uses _______________________________ for authentication. - Kerberos SSO - Single Sign OnThese systems are similar to SSO, and allow an identity to be reused on multiple sites while relying on authentication via a single identity provider. - Shared Authentication
Escuela, estudio y materia
- Institución
- Chapter 8: Identity and Access Management
- Grado
- Chapter 8: Identity and Access Management
Información del documento
- Subido en
- 22 de noviembre de 2023
- Número de páginas
- 8
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
chapter 8 identity and access management
Documento también disponible en un lote