Authentication and Access Control Flashcards
Nonpersistent or dissolvable NAC agents may help to make what possible?
BYOD initiative
Edge control
Unified voice services
BYOD initiative
A nonpersistent agent is one that is used to assess the device only during the onetime check-in at login. It can be used to support the assessment of endpoints not owned by the organization and as such can help to make a Bring Your Own Device (BYOD) policy possible
What is the main difference between a private network and a public network?
In a private network, everyone has access; in a public network, only authorized users have access.
There is no difference; in both a private and public network, only authorized users have access.
In a private network, only authorized users have access; in a public network, everyone that is connected has access.
In a private network, only authorized users have access; in a public network, everyone that is connected has access.
On a private network, only authorized users have access to the data, whereas in a public network, everyone connected has access to the data
You have a remote user who can connect to the Internet but not to the office via their VPN client. After determining the problem, which should be your next step?
Have the client reboot their host.
Make sure the user has the correct VPN address and password.
Have the client reinstall their VPN software.
Make sure the user has the correct VPN address and password.
After determining that the user has Internet access, your next step would be to verify the VPN address and password
Which IP address should you deny into your internetwork?
- 0.0.0/8
- 0.0.0/8
- 0.0.0/8
127.0.0.0/8
To have good security on your network, deny any addresses from your internal networks, deny any local host addresses (127.0.0.0/8), deny any reserved private addresses, and deny any addresses in the IP multicast address range (224.0.0.0/4)
Which of the following is a tunneling protocol?
Layer 2 Tunneling Protocol (L2TP)
Internet Protocol Security (IPSec)
Secure Sockets Layer (SSL)
All of the above
All of the above
Tunneling is encapsulating one protocol within another protocol to complete a secure transmission. Options A, B, and C are all tunneling protocols you should be aware of, as well as Secure Sockets Layer Virtual Private Network (SSL VPN) and Point-to-Point Tunneling Protocol (PPTP)
Which tunneling protocol is based on RSA public-key encryption?
SSL
L2TP
IPSec
SSL
SSL is based on RSA public-key encryption and is used to provide secure Session layer connections over the Internet between a web browser and a web server
What is the minimum number of characters you should use when creating a secure password?
6
7
8
8
The minimum length should be 8 characters, and the maximum length should be 15 characters. A strong password is a combination of alphanumeric and special characters that is easy for you to remember but difficult for someone else to guess
In which layer of the OSI model does IPSec operate?
Physical
Network
Transport
Network
IPSec works at the Network layer of the OSI model (Layer 3) and secures all applications that operate above it (Layer 4 and above). Additionally, because it was designed by the IETF and designed to work with IPv4 and IPv6, it has broad industry support and is quickly becoming the standard for VPNs on the Internet
Which protocol works in both the transport mode and tunneling mode?
SSL
PPTP
IPSec
IPSec
IPSec works in both transport mode and tunneling mode. In transport mode, a secure IP connection between two hosts is created. Data is protected by authentication or encryption (or both). Tunnel mode is used between network endpoints to protect all data going through the tunnel
Companies that want to ensure that their data is secure during transit should use which of the following?
Firewalls
Encryption
Data accounting
Encryption
Companies that want to ensure that their data is secure during transit should encrypt their data before transmission. Encryption is the process that encodes and decodes data
Which network utilities do not have the ability to encrypt passwords? (Select two.)
FTP
SSH
Telnet
SCP
FTP
Telnet
Some older network utilities such as FTP and Telnet don’t have the ability to encrypt passwords
To encode or read an encrypted message, what tool is necessary?
Routing table
Internet access
Encryption key
Encryption key
To encode a message and decode an encrypted message, you need the proper encryption key or keys. The encryption key is the table or formula that defines which character in the data translates to which encoded character
Which of the following is not an enhancement provided by TLS version 2.0?
Improvements in the operation of the MD5/SHA-1 hashing function
Enhanced support for the Advanced Encryption Standard (AES)
Expansion of the use of TLS to VPNs
Expansion of the use of TLS to VPNs
TLS was available for use with VPNs in earlier versions prior to 2.0
Which of the following is not a type of public-key encryption?
RSA Data Security
Pretty Good Privacy (PGP)
DES
DES
The Data Encryption Standard (DES) is not a type of public-key encryption
Which of the following VPN protocols runs over TCP port 1723, allows encryption to be done at the data level, and allows secure access?
RADIUS
PPPoE
PPTP
PPTP
PPTP is a VPN protocol that was created by Microsoft and uses TCP port 1723 for authetication and Generic Routing Encapsulation (GRE) to encrpyt data at the Application level