IC34M07 - Access Control Flashcards
True or False:
WAN LInks, VPNs, Remote Access Software and Terminal Services are technologies which can be used for Remote Access in an IACS?
True
True or False
VPNs limit protocols that can be sent and detect malicious code or behavior
False
What is Multi-Factor Authentication?
Factors for determining the authenticity of a person, device, or system
What are the four factors of Multi-Factor Authentication?
- What you Know
- What you Have
- What you are
- Where you are
What is a VPN?
Network that uses public telecomunication infrastructure to provide remote networks or computers with secure access to another network.
Which is a type of VPN?
1. Hosted
2. Controlled
3. Open
4. Site-to-Site
Site-to-Site
Which is a Remote Access Best Practice?
Require two-factor (or greater) authentication for any remote access sessions.