Network Security (2) Flashcards
Which of the following statements best describes asymmetric key encryption?
A cryptographic security mechanism that uses the same key for both encryption and decryption
A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data
A cryptographic security mechanism that uses two separate sets of public and private keys to encrypt and decrypt data
A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data
Asymmetric key encryption uses public and private keys. Data encrypted with the public key can only be decrypted using the private key. The reverse is also true. Symmetric key encryption uses only one key both to encrypt and decrypt data. Security mechanisms that use multiple key sets are not defined as symmetric
Which of the following protocols can you use to authenticate Windows remote access users with smartcards?
EAP
MS-CHAPv2
CHAP
EAP
The Extensible Authentication Protocol (EAP) is the only Windows remote authentication protocol that supports the use of authentication methods other than passwords, such as smartcards. MS-CHAPv2 is a strong remote access authentication protocol, but it supports password authentication only. Users cannot use smartcards. The Challenge Handshake Authentication Protocol (CHAP) is a relatively weak authentication protocol that does not support the use of smartcards. The Password Authentication Protocol (PAP) supports only clear text passwords, not smartcards
Which of the following statements best defines multifactor user authentication?
Verification of a user’s identity on all of a network’s resources using a single sign-on
Verification of a user’s identity using two or more types of credentials
Verification of a user’s identity on two devices at once
Verification of a user’s identity using two or more types of credentials
Multifactor authentication combines two or more authentication methods, requiring a user to supply multiple credentials. This reduces the likelihood that an intruder would be able to successfully impersonate a user during the authentication process. The term multifactor does not refer to the number of resources, devices, or groups with which the user is associated
How many keys does a system that employs asymmetric encryption use?
None. Asymmetric encryption doesn’t require keys.
One. Asymmetric encryption uses one key for both encryption and decryption.
Two. Asymmetric encryption uses one key for encryption and another key for decryption.
Two. Asymmetric encryption uses one key for encryption and another key for decryption.
Asymmetric encryption uses two separate keys, one for encryption and one for decryption. In a public key infrastructure (PKI), each user, computer, or service has both a public key and a private key
How many keys does a system that employs symmetric encryption use?
None. Symmetric encryption doesn’t require keys.
One. Symmetric encryption uses one key for both encryption and decryption.
Two. Symmetric encryption uses one key for encryption and another key for decryption.
One. Symmetric encryption uses one key for both encryption and decryption.
Symmetric encryption uses one key, which the systems use for both encryption and decryption
Which of the following services are methods of tracking a user’s activities on a network? (Choose all correct answers.)
Authentication
Authorization
Accounting
Auditing
Accounting
Auditing
Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected. Authentication is the confirmation of a user’s identity, and authorization defines the type of access granted to authenticated users
When a user supplies a password to log on to a server, which of the following actions is the user performing?
Authentication
Authorization
Accounting
Authentication
Authentication is the process of confirming a user’s identity. Passwords are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected
When a user swipes a finger across a fingerprint scanner log on to a laptop computer, which of the following actions is the user performing?
Authentication
Authorization
Accounting
Authentication
Authentication is the process of confirming a user’s identity. Fingerprints and other biometric readers are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected
Which of the following security protocols can authenticate users without transmitting their passwords over the network?
Kerberos
802.1X
TKIP
Kerberos
Kerberos is a security protocol used by Active Directory that employs a system of tickets to authenticate users and other network entities without the need to transmit credentials over the network. IEEE 802.1X does authenticate by transmitting credentials. Temporal Key Integrity Protocol (TKIP) and Lightweight Directory Access Protocol (LDAP) are not authentication protocols
Which of the following security procedures is often tied to group membership?
Authentication
Authorization
Accounting
Authorization
Authentication is the process of confirming a user’s identity. Authorization defines the type of access granted to authenticated users. In many instances, the authorization process is based on the groups to which a user belongs. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected
Which of the following standards is most commonly used to define the format of digital certificates?
802.1X
X.509
802.1q
X.509
X.509, published by the International Telecommunication Union’s Standardization sector (ITU-T), defines the format of digital certificates. X.500, another standard published by the ITU-T, defines functions of directory services. IEEE 802.1X is an authentication standard, and IEEE 802.1q defines the VLAN tagging format used on many network switches
Which of the following statements about authentication auditing are not true?
Auditing can disclose attempts to compromise passwords.
Auditing can detect authentications that occur after hours.
Auditing can identify the guess patterns used by password cracking software.
Auditing can identify the guess patterns used by password cracking software.
Auditing of authentication activities can record both successful and unsuccessful logon attempts. Large numbers of logon failures can indicate attempts to crack passwords. Auditing tracks the time of authentication attempts, sometimes enabling you to detect off-hours logons that indicate an intrusion. Auditing does not record the passwords specified during authentications, so it cannot identify patterns of unsuccessful guesses
Which of the following types of key is included in a digital certificate?
Public
Private
Preshared
Public
As part of a public key infrastructure (PKI), digital certificates are associated with a key pair, consisting of a public key and a private key. The public key is supplied with the certificate to any party authenticating the entity to which the certificate was issued. The private key is supplied to the entity with the certificate, but it is not distributed as part of the certificate. Preshared keys are not associated with certificates, and privileged keys do not exist
When a user swipes a smartcard through a reader to log on to a laptop computer, which of the following actions is the user performing?
Authentication
Authorization
Accounting
Authentication
Authentication is the process of confirming a user’s identity. Smartcards are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected
Combining elements like something you know, something you have, and something you are to provide access to a secured network resource is a definition of which of the following types of authentication?
Multifactor
Multisegment
Multimetric
Multifactor
Multifactor authentication combines two or more authentication methods and reduces the likelihood that an intruder would be able to successfully impersonate a user during the authentication process. A password (something you know) and a retinal scan (something you are) is an example of a multifactor authentication system. A smartcard and a PIN, which is the equivalent of a password, is another example of multifactor authentication because it requires users to supply something they know and something they have. Multisegment, multimetric, and multifiltered are not applicable terms in this context