Authentication Flashcards

1
Q

You want to implement an authentication method that uses public and private key pairs. Which authentication
method should you use?

EAP
MS-CHAP v2
IPsec
PKI

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following applications typically use 802.1x authentication? (Select two.)

Authenticating VPN users through the Internet
Controlling access through a wireless access point
Controlling access through a switch
Authenticating remote access clients
Controlling access through a router

A

Controlling access through a wireless access point

Controlling access through a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You want to increase the security of your network by allowing only authenticated users to be able to access
network devices through a switch.
Which of the following should you implement?

Spanning tree
Port security
IPsec
802.1x

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a feature of MS-CHAP v2 that is not included in CHAP?

Certificate-based authentication
Mutual authentication
Hashed shared secret
Three-way handshake

A

Mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a mechanism for granting and validating certificates?

PKI
Kerberos
RADIUS
AAA

A

PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When using Kerberos authentication, which of the following terms is used to describe the token that verifies
the identity of the user to the target system?

Coupon
Voucher
Hashkey
Ticket

A

Ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following authentication methods uses tickets to provide single sign-on?

MS-CHAP
802.1x
Kerberos
PKI

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have been contracted by a firm to implement a new remote access solution based on a Windows Server
2003 system. The customer wants to purchase and install a smartcard system to provide a high level of
security to the implementation.
Which of the following authentication protocols are you most likely to recommend to the client?

CHAP
PPP
EAP
MS-CHAP

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following authentication protocols uses a three-way handshake to authenticate users to the
network? (Choose two.)

MS-CHAP
CHAP
PAP
EAP

A

MS-CHAP

CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have a Web server that will be used for secure transactions for customers who access the Web site over
the Internet. The Web server requires a certificate to support SSL.
Which method would you use to get a certificate for the server?

Run a third-party tool to generate the certificate.
Obtain a certificate from a public PKI.
Have the server generate its own certificate.
Create your own internal PKI to issue certificates.

A

Obtain a certificate from a public PKI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are used when implementing Kerberos for authentication and authorization? (Select
two.)

PPPoE
RADIUS or TACACS+ server
Time server
PPP
Ticket granting server
A

Time server

Ticket granting server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly