Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Examen

CNIT 242 Final Exam Questions with correct Answers

Note
-
Vendu
-
Pages
50
Grade
A+
Publié le
05-08-2024
Écrit en
2024/2025

Exam of 50 pages for the course CNIT at CNIT (CNIT 242 Final Exam)

Établissement
CNIT
Cours
CNIT











Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
CNIT
Cours
CNIT

Infos sur le Document

Publié le
5 août 2024
Nombre de pages
50
Écrit en
2024/2025
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

CNIT 242 Final Exam

What does AAA stand for? - answer Authentication, Authorization, and Accounting

What question does Authentication answer? - answer Do you have the credentials
necessary to access this system?

What question does Authorization answer? - answer Once authenticated, what do you
have permission to do?

What question does Accounting answer? - answer Once authorized to access a
resource, how much of the resource are you using?

Authentication can be accomplished using any of what 4 qualifications? - answer What
you know, what you have, what you are, where you are

What is two-factor authentication? - answer Using two of the 4 authentication
qualifications to prove an identity.

What 2 steps does the authentication process involve? - answer Identification and proof
of identification

What are ways to provide identification? - answer User ID, physical object (such as
ATM card), biometrics, digital certificates

What are ways to provide proof of identification? - answer passwords, access codes,
one-time tokens, biometrics, digital certificates

What are strategic ways to develop user IDs? - answer computer generated (NEVER
simple names), sometimes created to some algorithm, NEVER use the same as email
address

True or False: UID / password combo can be a powerful method of authentication if
properly managed - answerTrue

What is the number one rule of password security? - answerDON'T WRITE
PASSWORDS DOWN

What is the security tradeoff with password? - answerThe more strict the password
rules, the higher the chances users will violate the first rule of secure passwords

,What are biometrics? - answerauthentication. functions as both ID and proof of ID,
separated into physiological and behavioral

What are digital certificates? - answera form of authentication. encrypted data files that
uses a Certificate Authority to guarantee the identity of the holder

What does RADIUS stand for and what does it provide? - answerRemote Access Dial-In
User Service, both Authentication and Authorization

What does TACAS+ stand for? - answerTerminal Access Controller Access Control
Service Plus

Where does authentication across the network exist? - answeron the local computer by
default, but in an enterprise environment, it will be on a different server

In a domain environment, what is authenticated against? - answerthe domain, not the
local machine

How is authorization accomplished? - answerthrough rights and permissions

What level do group policies assign rights to? - answersystem

What level do access control lists assign permissions to? - answerobject

What is an access control list? - answersimplest method of providing authorization, but
requires a separate authentication method. they are attached to/located on the resource

What do ACLs contain? - answera list of authorized users and their authorization levels

When do "share" permissions apply? - answerwhen the resource is accessed over a
network

What 3 servers does Kerberos require? - answerone authentication server, one ticket
granting server, and at least one application server

What is the basic concept of Kerberos? - answerIf a secret is known by only two people,
either person can verify the identity of the other by confirming that the other person
knows the secret.

What is the purpose of a Kerberos Realm? - answeradmins create the realms which
encompass all that is available to access. a realm defines what Kerberos manages in
terms of who can access what.

What is within a Kerberos Realm? - answerWithin the realm is the Client and the
service/host machine to which they requested access. There is also the Key Distribution
Center which hold the Authentication S and TGS

,In Kerberos, when requesting access to a service or host, three interactions take place
between you and: - answerthe Authentication Server, the Ticket Granting Server, and
the Service or host machine that you're wanting access to

What will you receive with each interaction in Kerberos? - answerTwo messages. Each
message is one that you can decrypt, and one that you can not.

In Kerberos, does the service/machine you are requesting access to communicate
directly with the KDC? - answerNo, they do not!

Where are all the secret keys for user machines and services stored in Kerberos? -
answerthe KDC

What are secret keys (in Kerberos)? - answerpasswords plus a salt that are hashed

True or False: There are passwords on the services/host machines that use Kerberos. -
answerFalse

What happens during the set up of Kerberos? - answerhash algorithm is chosen for
secret keys, admin choses a key for the service/host machine to memorize

What type of cryptography does Kerberos use? - answersymmetric/private key, but can
be configured to use public key

How is the KDC protected? - answerit itself is encrypted with a master key

What are traits of TACAS? - answerCisco-proprietary, TCP, AAA are separate
processes

What are traits of RADIUS? - answerOpen standard, UDP, combines Authentication
and Authorization, only encrypts password

What are traits of Kerberos? - answerAuthentication only, no Authorization or
Accounting

What standard does naming in AD follow? - answerLDAP standard

What needs to be formed among domain trees (explicitly or implicitly) to build a domain
forest? - answertrust relationships

Does creating AD groups as "Universal" maximize performance? - answerno, it does
not maximize

When is the Authoritative DNS server contacted? - answerWhen the configured DNS
server does not have the record in its database/cache

, Can users access their files when not connected to the network using Roaming User
Profiles? - answerNo, that's not what roaming profiles do

What is the order in which group policies are applied? - answerlocal, site, domain, OU

T/F: leaf objects can inherit attributes from its parent containers - answerT

T/F: X.500 is the original basis for Kerberos - answerF

What resource can provide centralized user authentication, and enables a general
"phone book" about network users? - answera directory

Does AD use LDAP to do Authentication and Authorization? - answerno...just
authorization

What is a directory? - answera centralized, hierarchical information repository about
objects in an IT system

What types of objects does a directory organize and centralize information about? -
answerusers, groups, devices, servers, external applications

What are directory services? - answerProtocols, functions, and APIs that allow access
to directory information, the benefit provided by the directory to the users

Can a directory be used as the basis for single sign on? - answeryeah boi it can

Tr/Fa: a directory provides for granularity of administration through its hierarchical
grouping structure - answerTr

What logical view is a directory organized into? What are the 3 main components? -
answera "tree". root, branch and leaf

What are the two ways a directory can be arranged/organized? - answergeographic or
functional

What is pruning and grafting? - answermoving items in the directory to new locations,
such as individual users, groups, computers, or even whole sections of the directory

What are attributes? - answerVariables with values that are relevant to items in that part
of the directory

Why do items inherit attributes based on their location in the directory? - answerEnsures
consistency across items within a directory location
€13,12
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien


Document également disponible en groupe

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
julianah420 Phoenix University
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
657
Membre depuis
2 année
Nombre de followers
324
Documents
33952
Dernière vente
1 jours de cela
NURSING,TESTBANKS,ASSIGNMENT,AQA AND ALL REVISION MATERIALS

On this page, you find all documents, package deals, and flashcards offered by seller julianah420

4,3

149 revues

5
101
4
20
3
8
2
5
1
15

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions