100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CNIT 242 Final Exam Questions with correct Answers

Puntuación
-
Vendido
-
Páginas
50
Grado
A+
Subido en
05-08-2024
Escrito en
2024/2025

Exam of 50 pages for the course CNIT at CNIT (CNIT 242 Final Exam)

Institución
CNIT
Grado
CNIT











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CNIT
Grado
CNIT

Información del documento

Subido en
5 de agosto de 2024
Número de páginas
50
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CNIT 242 Final Exam

What does AAA stand for? - answer Authentication, Authorization, and Accounting

What question does Authentication answer? - answer Do you have the credentials
necessary to access this system?

What question does Authorization answer? - answer Once authenticated, what do you
have permission to do?

What question does Accounting answer? - answer Once authorized to access a
resource, how much of the resource are you using?

Authentication can be accomplished using any of what 4 qualifications? - answer What
you know, what you have, what you are, where you are

What is two-factor authentication? - answer Using two of the 4 authentication
qualifications to prove an identity.

What 2 steps does the authentication process involve? - answer Identification and proof
of identification

What are ways to provide identification? - answer User ID, physical object (such as
ATM card), biometrics, digital certificates

What are ways to provide proof of identification? - answer passwords, access codes,
one-time tokens, biometrics, digital certificates

What are strategic ways to develop user IDs? - answer computer generated (NEVER
simple names), sometimes created to some algorithm, NEVER use the same as email
address

True or False: UID / password combo can be a powerful method of authentication if
properly managed - answerTrue

What is the number one rule of password security? - answerDON'T WRITE
PASSWORDS DOWN

What is the security tradeoff with password? - answerThe more strict the password
rules, the higher the chances users will violate the first rule of secure passwords

,What are biometrics? - answerauthentication. functions as both ID and proof of ID,
separated into physiological and behavioral

What are digital certificates? - answera form of authentication. encrypted data files that
uses a Certificate Authority to guarantee the identity of the holder

What does RADIUS stand for and what does it provide? - answerRemote Access Dial-In
User Service, both Authentication and Authorization

What does TACAS+ stand for? - answerTerminal Access Controller Access Control
Service Plus

Where does authentication across the network exist? - answeron the local computer by
default, but in an enterprise environment, it will be on a different server

In a domain environment, what is authenticated against? - answerthe domain, not the
local machine

How is authorization accomplished? - answerthrough rights and permissions

What level do group policies assign rights to? - answersystem

What level do access control lists assign permissions to? - answerobject

What is an access control list? - answersimplest method of providing authorization, but
requires a separate authentication method. they are attached to/located on the resource

What do ACLs contain? - answera list of authorized users and their authorization levels

When do "share" permissions apply? - answerwhen the resource is accessed over a
network

What 3 servers does Kerberos require? - answerone authentication server, one ticket
granting server, and at least one application server

What is the basic concept of Kerberos? - answerIf a secret is known by only two people,
either person can verify the identity of the other by confirming that the other person
knows the secret.

What is the purpose of a Kerberos Realm? - answeradmins create the realms which
encompass all that is available to access. a realm defines what Kerberos manages in
terms of who can access what.

What is within a Kerberos Realm? - answerWithin the realm is the Client and the
service/host machine to which they requested access. There is also the Key Distribution
Center which hold the Authentication S and TGS

,In Kerberos, when requesting access to a service or host, three interactions take place
between you and: - answerthe Authentication Server, the Ticket Granting Server, and
the Service or host machine that you're wanting access to

What will you receive with each interaction in Kerberos? - answerTwo messages. Each
message is one that you can decrypt, and one that you can not.

In Kerberos, does the service/machine you are requesting access to communicate
directly with the KDC? - answerNo, they do not!

Where are all the secret keys for user machines and services stored in Kerberos? -
answerthe KDC

What are secret keys (in Kerberos)? - answerpasswords plus a salt that are hashed

True or False: There are passwords on the services/host machines that use Kerberos. -
answerFalse

What happens during the set up of Kerberos? - answerhash algorithm is chosen for
secret keys, admin choses a key for the service/host machine to memorize

What type of cryptography does Kerberos use? - answersymmetric/private key, but can
be configured to use public key

How is the KDC protected? - answerit itself is encrypted with a master key

What are traits of TACAS? - answerCisco-proprietary, TCP, AAA are separate
processes

What are traits of RADIUS? - answerOpen standard, UDP, combines Authentication
and Authorization, only encrypts password

What are traits of Kerberos? - answerAuthentication only, no Authorization or
Accounting

What standard does naming in AD follow? - answerLDAP standard

What needs to be formed among domain trees (explicitly or implicitly) to build a domain
forest? - answertrust relationships

Does creating AD groups as "Universal" maximize performance? - answerno, it does
not maximize

When is the Authoritative DNS server contacted? - answerWhen the configured DNS
server does not have the record in its database/cache

, Can users access their files when not connected to the network using Roaming User
Profiles? - answerNo, that's not what roaming profiles do

What is the order in which group policies are applied? - answerlocal, site, domain, OU

T/F: leaf objects can inherit attributes from its parent containers - answerT

T/F: X.500 is the original basis for Kerberos - answerF

What resource can provide centralized user authentication, and enables a general
"phone book" about network users? - answera directory

Does AD use LDAP to do Authentication and Authorization? - answerno...just
authorization

What is a directory? - answera centralized, hierarchical information repository about
objects in an IT system

What types of objects does a directory organize and centralize information about? -
answerusers, groups, devices, servers, external applications

What are directory services? - answerProtocols, functions, and APIs that allow access
to directory information, the benefit provided by the directory to the users

Can a directory be used as the basis for single sign on? - answeryeah boi it can

Tr/Fa: a directory provides for granularity of administration through its hierarchical
grouping structure - answerTr

What logical view is a directory organized into? What are the 3 main components? -
answera "tree". root, branch and leaf

What are the two ways a directory can be arranged/organized? - answergeographic or
functional

What is pruning and grafting? - answermoving items in the directory to new locations,
such as individual users, groups, computers, or even whole sections of the directory

What are attributes? - answerVariables with values that are relevant to items in that part
of the directory

Why do items inherit attributes based on their location in the directory? - answerEnsures
consistency across items within a directory location
$14.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
julianah420 Phoenix University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
657
Miembro desde
2 año
Número de seguidores
324
Documentos
33952
Última venta
1 día hace
NURSING,TESTBANKS,ASSIGNMENT,AQA AND ALL REVISION MATERIALS

On this page, you find all documents, package deals, and flashcards offered by seller julianah420

4.3

149 reseñas

5
101
4
20
3
8
2
5
1
15

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes