Chapter 13: Authentication & Access Control Flashcards

1
Q

What’s added to AAAA from AAA? pg. 458

A

auditing is added to the AAA features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA and AAAA are __ , __ models for managing network security through one central location. pg. 458

A

systemized and conceptual models because they’re not protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F RADIUS is utilized for Dial-Up accessibility. pg. 458

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What could you use for authentication on an RAS server as an alternative to RADIUS? pg. 458

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can be layered on top SSL/TLS to protect your HTTP traffic? pg. 459

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s another name for network controller? pg. 460

A

Network Interface Card or NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which authentication protocols could you add to your network to ensure the username and password never cross the wire? pg. 460

A

CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Microsoft’s own variation of CHAP and how is it different? pg. 461

A

MS-CHAP / unlike CHAP, which requires the shared secret to be stored locally in clear text, MS-CHAP encrypts the secret locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What uses a cryptographic process that uses an algorithm to verify that information came from where it says and that it has not changed. pg. 462

A

Hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ron Rivest designed this algorithm that is used to ensure the integrity of transmission. pg. 462

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This feature comes into play when a device attempts to access the network. pg. 462

A

Posture Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Posture Assessment check? pg. 463

A

Anti-malware updates, operating system updates, Windows Registry settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens to a device trying to connect to your network prior to Posture Assessment taking place? pg. 463

A

the device is first placed in a Guest Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly