Authentication Flashcards
You want to implement an authentication method that uses public and private key pairs. Which authentication
method should you use?
EAP
MS-CHAP v2
IPsec
PKI
EAP
Which of the following applications typically use 802.1x authentication? (Select two.)
Authenticating VPN users through the Internet
Controlling access through a wireless access point
Controlling access through a switch
Authenticating remote access clients
Controlling access through a router
Controlling access through a wireless access point
Controlling access through a switch
You want to increase the security of your network by allowing only authenticated users to be able to access
network devices through a switch.
Which of the following should you implement?
Spanning tree
Port security
IPsec
802.1x
802.1x
Which of the following is a feature of MS-CHAP v2 that is not included in CHAP?
Certificate-based authentication
Mutual authentication
Hashed shared secret
Three-way handshake
Mutual authentication
Which of the following is a mechanism for granting and validating certificates?
PKI
Kerberos
RADIUS
AAA
PKI
When using Kerberos authentication, which of the following terms is used to describe the token that verifies
the identity of the user to the target system?
Coupon
Voucher
Hashkey
Ticket
Ticket
Which of the following authentication methods uses tickets to provide single sign-on?
MS-CHAP
802.1x
Kerberos
PKI
Kerberos
You have been contracted by a firm to implement a new remote access solution based on a Windows Server
2003 system. The customer wants to purchase and install a smartcard system to provide a high level of
security to the implementation.
Which of the following authentication protocols are you most likely to recommend to the client?
CHAP
PPP
EAP
MS-CHAP
EAP
Which of the following authentication protocols uses a three-way handshake to authenticate users to the
network? (Choose two.)
MS-CHAP
CHAP
PAP
EAP
MS-CHAP
CHAP
You have a Web server that will be used for secure transactions for customers who access the Web site over
the Internet. The Web server requires a certificate to support SSL.
Which method would you use to get a certificate for the server?
Run a third-party tool to generate the certificate.
Obtain a certificate from a public PKI.
Have the server generate its own certificate.
Create your own internal PKI to issue certificates.
Obtain a certificate from a public PKI.
Which of the following are used when implementing Kerberos for authentication and authorization? (Select
two.)
PPPoE RADIUS or TACACS+ server Time server PPP Ticket granting server
Time server
Ticket granting server