2B Flashcards
Systems that provide centralization of authentication, authorization, and accounting are known as ____. These services are used on corporate networks, for example, wireless and
virtual private networks.
AAA “Triple A”
Together, these make up the first “A” in AAA.
Identification and Authentication
___ means presenting information about yourself to a system, such as a username or a smartcard. The part of AAA services that validate the identification presented by a user is ____. The service authenticates the user by checking what the user entered against a database of users and authentication factors such as passwords or biometric information.
Identification
Authentication
After verifying the account information, the user is granted access to the network. The user can then perform tasks that they have been permitted to perform.
Authorization
What does RADIUS stand for?
Remote Authentication Dial In User Service
What are some authentication methods that fall under AAA?
- RADIUS
- Diameter
- TACACS and XTACACS
- TACACS+
The following describes which AAA authentication method?
With ____, clients can access a network remotely by connecting to a ___ client which sends an authentication request via User Datagram Protocol (UDP) to a ____ server which either verifies or rejects the credentials, thereby granting or denying access. The 802.1X protocol
can be used in conjunction with ____ on wireless networks and switches that support it.
RADIUS
RADIUS uses which protocol: UDP or TCP?
UDP
The following describes which AAA authentication method?
____ is a newer AAA protocol that gives a more reliable and secure communication service through Transmission Control Protocol (TCP).
Diameter
Diameter uses which protocol: UDP or TCP?
TCP
Terminal Access Controller Access Control System (TACACS) is a legacy authentication service for ____ systems.
Unix
Extended TACACS (XTACACS) is an authentication service for ____
devices.
Cisco
____ replaced TACACS and XTACAS. _____ is the AAA protocol used in modern Cisco networks.
TACACS+
____ logs user activity on a network and tracks usage. Any network resources (such as access time and bandwidth) the user consumes during their session is logged.
Accounting