Lesson 7 - Questions Flashcards

1
Q

What is the difference between authorization and authentication?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What steps should be taken to enroll a new employee on a domain network?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false? An account requiring a password, PIN, and smart card is an example of three-factor authentication.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What methods can be used to implement location-based authentication?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why might a PIN be a particularly weak type of something you know authentication?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In what scenario would PAP be considered a secure authentication method?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false? In order to create a service ticket, Kerberos passes the user’s password to the target application server for authentication.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user maintains a list of commonly used passwords in a file located deep within the computer’s directory structure. Is this secure password management?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which property of a plaintext password is most effective at defeating a brute-force attack?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or false? When implementing smart card logon, the user’s private key is stored on the smart card.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are providing consultancy to a firm to help them implement smart card authentication to premises networks and cloud services. What are the main advantages of using an HSM over server-based key and certificate management services?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which network access control framework supports smart cards?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a RADIUS client?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is EAPoL?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does OTP protect against password guessing or sniffing attacks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Apart from cost, what would you consider to be the major considerations for evaluating a biometric recognition technology?

A
17
Q

How is a fingerprint reader typically implemented as hardware?

A
18
Q

Which type of eye recognition is easier to perform: retinal or iris scanning?

A
19
Q

What two ways can biometric technologies be used other than for logon authentication?

A