Network Security (2) Flashcards
Which of the following statements best describes asymmetric key encryption?
A cryptographic security mechanism that uses the same key for both encryption and decryption
A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data
A cryptographic security mechanism that uses two separate sets of public and private keys to encrypt and decrypt data
A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data
Asymmetric key encryption uses public and private keys. Data encrypted with the public key can only be decrypted using the private key. The reverse is also true. Symmetric key encryption uses only one key both to encrypt and decrypt data. Security mechanisms that use multiple key sets are not defined as symmetric
Which of the following protocols can you use to authenticate Windows remote access users with smartcards?
EAP
MS-CHAPv2
CHAP
EAP
The Extensible Authentication Protocol (EAP) is the only Windows remote authentication protocol that supports the use of authentication methods other than passwords, such as smartcards. MS-CHAPv2 is a strong remote access authentication protocol, but it supports password authentication only. Users cannot use smartcards. The Challenge Handshake Authentication Protocol (CHAP) is a relatively weak authentication protocol that does not support the use of smartcards. The Password Authentication Protocol (PAP) supports only clear text passwords, not smartcards
Which of the following statements best defines multifactor user authentication?
Verification of a user’s identity on all of a network’s resources using a single sign-on
Verification of a user’s identity using two or more types of credentials
Verification of a user’s identity on two devices at once
Verification of a user’s identity using two or more types of credentials
Multifactor authentication combines two or more authentication methods, requiring a user to supply multiple credentials. This reduces the likelihood that an intruder would be able to successfully impersonate a user during the authentication process. The term multifactor does not refer to the number of resources, devices, or groups with which the user is associated
How many keys does a system that employs asymmetric encryption use?
None. Asymmetric encryption doesn’t require keys.
One. Asymmetric encryption uses one key for both encryption and decryption.
Two. Asymmetric encryption uses one key for encryption and another key for decryption.
Two. Asymmetric encryption uses one key for encryption and another key for decryption.
Asymmetric encryption uses two separate keys, one for encryption and one for decryption. In a public key infrastructure (PKI), each user, computer, or service has both a public key and a private key
How many keys does a system that employs symmetric encryption use?
None. Symmetric encryption doesn’t require keys.
One. Symmetric encryption uses one key for both encryption and decryption.
Two. Symmetric encryption uses one key for encryption and another key for decryption.
One. Symmetric encryption uses one key for both encryption and decryption.
Symmetric encryption uses one key, which the systems use for both encryption and decryption
Which of the following services are methods of tracking a user’s activities on a network? (Choose all correct answers.)
Authentication
Authorization
Accounting
Auditing
Accounting
Auditing
Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected. Authentication is the confirmation of a user’s identity, and authorization defines the type of access granted to authenticated users
When a user supplies a password to log on to a server, which of the following actions is the user performing?
Authentication
Authorization
Accounting
Authentication
Authentication is the process of confirming a user’s identity. Passwords are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected
When a user swipes a finger across a fingerprint scanner log on to a laptop computer, which of the following actions is the user performing?
Authentication
Authorization
Accounting
Authentication
Authentication is the process of confirming a user’s identity. Fingerprints and other biometric readers are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected
Which of the following security protocols can authenticate users without transmitting their passwords over the network?
Kerberos
802.1X
TKIP
Kerberos
Kerberos is a security protocol used by Active Directory that employs a system of tickets to authenticate users and other network entities without the need to transmit credentials over the network. IEEE 802.1X does authenticate by transmitting credentials. Temporal Key Integrity Protocol (TKIP) and Lightweight Directory Access Protocol (LDAP) are not authentication protocols
Which of the following security procedures is often tied to group membership?
Authentication
Authorization
Accounting
Authorization
Authentication is the process of confirming a user’s identity. Authorization defines the type of access granted to authenticated users. In many instances, the authorization process is based on the groups to which a user belongs. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected
Which of the following standards is most commonly used to define the format of digital certificates?
802.1X
X.509
802.1q
X.509
X.509, published by the International Telecommunication Union’s Standardization sector (ITU-T), defines the format of digital certificates. X.500, another standard published by the ITU-T, defines functions of directory services. IEEE 802.1X is an authentication standard, and IEEE 802.1q defines the VLAN tagging format used on many network switches
Which of the following statements about authentication auditing are not true?
Auditing can disclose attempts to compromise passwords.
Auditing can detect authentications that occur after hours.
Auditing can identify the guess patterns used by password cracking software.
Auditing can identify the guess patterns used by password cracking software.
Auditing of authentication activities can record both successful and unsuccessful logon attempts. Large numbers of logon failures can indicate attempts to crack passwords. Auditing tracks the time of authentication attempts, sometimes enabling you to detect off-hours logons that indicate an intrusion. Auditing does not record the passwords specified during authentications, so it cannot identify patterns of unsuccessful guesses
Which of the following types of key is included in a digital certificate?
Public
Private
Preshared
Public
As part of a public key infrastructure (PKI), digital certificates are associated with a key pair, consisting of a public key and a private key. The public key is supplied with the certificate to any party authenticating the entity to which the certificate was issued. The private key is supplied to the entity with the certificate, but it is not distributed as part of the certificate. Preshared keys are not associated with certificates, and privileged keys do not exist
When a user swipes a smartcard through a reader to log on to a laptop computer, which of the following actions is the user performing?
Authentication
Authorization
Accounting
Authentication
Authentication is the process of confirming a user’s identity. Smartcards are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected
Combining elements like something you know, something you have, and something you are to provide access to a secured network resource is a definition of which of the following types of authentication?
Multifactor
Multisegment
Multimetric
Multifactor
Multifactor authentication combines two or more authentication methods and reduces the likelihood that an intruder would be able to successfully impersonate a user during the authentication process. A password (something you know) and a retinal scan (something you are) is an example of a multifactor authentication system. A smartcard and a PIN, which is the equivalent of a password, is another example of multifactor authentication because it requires users to supply something they know and something they have. Multisegment, multimetric, and multifiltered are not applicable terms in this context
How does MAC address filtering increase the security of a wireless LAN?
By allowing traffic sent to or from specific MAC addresses through the Internet firewall
By substituting registered MAC addresses for unregistered ones in network packets
By permitting only devices with specified MAC addresses to connect to an access point
By permitting only devices with specified MAC addresses to connect to an access point
MAC address filtering enables administrators to configure an access point to allow only devices with specific addresses to connect; all other traffic is rejected. Access points broadcast their presence using an SSID, not a MAC address. MAC address filtering protects wireless LANs when implemented in an access point, not a firewall. MAC address filtering does not call for the modification of addresses in network packets
Which of the following terms describes a system that prevents computers from logging on to a network unless they have the latest updates and antimalware software installed?
NAC
LDAP
RADIUS
NAC
Network Access Control is a mechanism that defines standards of equipment and configuration that systems must meet before they can connect to the network. Lightweight Directory Access Protocol (LDAP) provides communication between directory service entities. RADIUS is an authentication, authorization, and accounting service for remote users connecting to a network. Temporal Key Integrity Protocol (TKIP) with the RC4 cipher is an encryption protocol used on wireless networks running the Wi-Fi Protected Access (WPA) security protocol
Which of the following statements best describes symmetric key encryption?
A cryptographic security mechanism that uses the same key for both encryption and decryption
A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data
A cryptographic security mechanism that uses two separate sets of public and private keys to encrypt and decrypt data
A cryptographic security mechanism that uses the same key for both encryption and decryption
Symmetric key encryption uses only one key both to encrypt and decrypt data. Asymmetric key encryption uses public and private keys. Security mechanisms that use multiple key sets are not defined as symmetric
Which of the following is the best description of geofencing?
Something you have
Something you know
Somewhere you are
Somewhere you are
Geofencing is the generic term for a technology that limits access to a network or other resource based on the client’s location. It is therefore best described as somewhere you are. A finger gesture would be considered something you do, a password something you know, and a smartcard something you have
Which of the following describes the primary difference between single sign-on and same sign-on?
Single sign-on requires the user to supply credentials only once, whereas with same sign-on, the user must supply the credentials repeatedly.
Single sign-on enables users to access different resources with one set of credentials, whereas same sign-on requires users to have multiple credential sets.
Single sign-on credentials consist of one username and one password, whereas same sign-on credentials consist of one username and multiple passwords.
Single sign-on requires the user to supply credentials only once, whereas with same sign-on, the user must supply the credentials repeatedly.
Single Sign On uses one set of credentials and requires the user to supply them only once to gain access to multiple resources. Same Sign On also uses a single set of credentials, with one password, but the user must perform individual logons for each resource. Neither Single Sign On nor Same Sign On requires multifactor authentication
Which of the following is the best description of biometrics?
Something you know
Something you have
Something you are
Something you are
Biometrics is a type of authentication factor that uses a physical characteristic that uniquely identifies an individual, such as a fingerprint or a retinal pattern. Biometrics is therefore best described as something you are, as opposed to something you know, have, or do
Which of the following authentication factors is an example of something you have?
A fingerprint
A smartcard
A password
A smartcard
Something you have refers to a physical possession that serves to identify a user, such as a smartcard. This type of authentication is typically used as part of a multifactor authentication procedure, because a smartcard or other physical possession can be lost or stolen. A fingerprint would be considered something you are, a password something you know, and a finger gesture something you do
Which of the following statements best describes the primary scenario for the use of TACACS+?
TACACS+ was designed to provide authentication, authorization, and accounting services for the Active Directory directory service.
TACACS+ was designed to provide authentication, authorization, and accounting services for remote dial-up users.
TACACS+ was designed to provide authentication, authorization, and accounting services for network routers and switches.
TACACS+ was designed to provide authentication, authorization, and accounting services for network routers and switches.
Terminal Access Controller Access Control System Plus (TACACS+) is a protocol designed to provide AAA services for networks with many routers and switches, enabling administrators to access them with a single set of credentials. It was not designed to provide AAA services for wireless networks, Active Directory, or remote dial-in users
Which of the following is not one of the functions provided by TACACS+?
Authentication
Authorization
Administration
Administration
Terminal Access Controller Access Control System Plus (TACACS+) is a protocol that was designed to provide AAA services for networks with many routers and switches. AAA stands for authentication, authorization, and accounting, but not administration
The new door lock on your company’s datacenter door requires you to supply both a PIN and a thumbprint scan. Which of the following types of authentication factors does the lock use? (Choose all correct answers.)
Something you have
Something you know
Something you are
Something you do
Something you know
Something you are
A PIN, like a password, is something you know, and a thumbprint, or any other biometric factor, is something you are. An example of something you have would be a smartcard, and an example of something you do would be a finger gesture