Network Security Flashcards
Which motion detection system has a reflective panel to create zones of detection?
Microwave
Vibration
Passive infrared (PIR)
Passive infrared (PIR)
Passive infrared (PIR) contains a reflective panel that creates different zones of detection. The reflective panel is distinctive to PIR sensors
You need to deploy a surveillance camera in an area that requires you to record the equipment the entire time it has entered your datacenter to the time it is installed. Which type of surveillance camera should you deploy?
CCTV
PTZ
Coaxial
PTZ
Pan tilt zoom (PTZ) cameras allow for intervention of a situation. In situations where you must track and record equipment as it is moved, such as in casino environments, PTZ cameras should be used
You work for a library and require an asset tracking system that is inexpensive and will notify you when equipment leaves the building. Which type of system should you purchase and deploy?
Bluetooth
Passive RFID
802.11 asset tracking
Passive RFID
A passive RFID system is inexpensive because the transponder powers the RFID tag. Transponders located at egress points of the library will achieve the requirement
You require a physical security system that authenticates and authorizes employees into an area. Which system should you implement?
Key fobs
ID badges
Biometrics
Biometrics
Key fobs, ID badges, and combination locks do not provide authentication of employees. Only biometrics will provide a factor of authentication
Which is a physical authentication system that requires both a personal identification number (PIN) and the physical card?
Key fobs
Biometrics
Smart cards
Smart cards
Smart cards are the size of a credit card and contain an integrated circuit chip (ICC). The ICC contains a user’s private key that is unlocked with a PIN code
Which principle describes the process of verification of a user’s identity?
Authentication
Authorization
Accounting
Authentication
Authentication is the process of verification of the user’s identify. It can be performed with various factors such as something you know, you are, or have, in addition to other factors
Which authentication system is an open standard originally proposed by the Internet Engineer Task Force (IETF)?
RADIUS
TACACS+
Kerberos
RADIUS
Remote Authentication Dial-In User Service (RADIUS) was originally proposed by the IETF and became an open standard for authentication, often used with 802.1x
Which authentication system can use Advanced Encryption Standard (AES) encryption for encryption of user credentials?
RADIUS
TACACS+
Kerberos
Kerberos
Kerberos is an authentication system that can use Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) encryption for encryption of user credentials. It is exclusively used by Microsoft Active Directory as an authentication protocol
Which protocol is often used with single sign-on (SSO) to exchange credentials?
LDAP
SAML
ADFS
SAML
Security Assertion Markup Language (SAML) is an open-standard XML-based framework used for transmitting authentication and authorization information of users and computers
Which principle describes the process of verification of a user’s permissions?
Authentication
Authorization
Accounting
Authorization
Authorization is the process of verifying whether a user has permission for a specific action; it is followed by the authentication of the user
What protocol and port number does LDAP use for directory lookups?
TCP/389
TCP/1812
UDP/389
TCP/389
The protocol of TCP and the port number of 389 is used for LDAP lookups
Which authentication factor is an example of personal human characteristic?
Typing your password
A location you are in
Your voice
Your voice
Voice recognition is an example of a personal human characteristic
Which authentication factor is an example somewhere you are?
Your IP address
An RFID tag
Your MAC address
Your IP address
Your IP address is an example of an authentication factor of somewhere you are. Geographical IP lookups via a Geo-IP database helps provide your approximate location
Which Cisco proprietary protocol is used to transmit credentials for 802.1x authentication systems?
LEAP
EAP
PEAP
LEAP
Lightweight Extensible Authentication Protocol (LEAP) is a Cisco proprietary protocol that was developed and is used by Cisco devices for authentication via 802.1x
What is the proper terminology for a switch or wireless access point (WAP), when 802.1x is implemented?
Authenticating server
Authenticator
Supplicant
Authenticator
A switch or WAP is considered an 802.1x authenticator. The authenticator directly communicates between the supplicant and the authenticating server to relay credentials