Chapter 13 - Authentication and Access Control Flashcards

1
Q

is the process of verifying the identity of a user or
device before allowing access to the network.

A

Authentication and Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This process is twofold and includes ensuring that only authorized computers get to enter your network and making sure data you’re sending back and forth between networks is secured

A

Security Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(ACLs) are used to enforce security policies by defining which users or devices can access specific network resources.

A

Access Control Lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

creates secure communication channels over untrusted networks by encapsulating data within another protocol.

A

Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

protects data by converting it into an unreadable format ensuring that only authorized users with the correct decryption key can access the original information.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

enables users to connect to a
network or system from a remote location.

A

Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(MFA)

A

multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(2FA) adds an extra layer of security by combining something the user knows (password) with something they have (e.g., a mobile device for a verification code).

A

Two-Factor
Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly