Network Security (2) Flashcards

1
Q

Which of the following statements best describes asymmetric key encryption?

A cryptographic security mechanism that uses the same key for both encryption and decryption

A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data

A cryptographic security mechanism that uses two separate sets of public and private keys to encrypt and decrypt data

A

A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data

Asymmetric key encryption uses public and private keys. Data encrypted with the public key can only be decrypted using the private key. The reverse is also true. Symmetric key encryption uses only one key both to encrypt and decrypt data. Security mechanisms that use multiple key sets are not defined as symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following protocols can you use to authenticate Windows remote access users with smartcards?

EAP

MS-CHAPv2

CHAP

A

EAP

The Extensible Authentication Protocol (EAP) is the only Windows remote authentication protocol that supports the use of authentication methods other than passwords, such as smartcards. MS-CHAPv2 is a strong remote access authentication protocol, but it supports password authentication only. Users cannot use smartcards. The Challenge Handshake Authentication Protocol (CHAP) is a relatively weak authentication protocol that does not support the use of smartcards. The Password Authentication Protocol (PAP) supports only clear text passwords, not smartcards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following statements best defines multifactor user authentication?

Verification of a user’s identity on all of a network’s resources using a single sign-on

Verification of a user’s identity using two or more types of credentials

Verification of a user’s identity on two devices at once

A

Verification of a user’s identity using two or more types of credentials

Multifactor authentication combines two or more authentication methods, requiring a user to supply multiple credentials. This reduces the likelihood that an intruder would be able to successfully impersonate a user during the authentication process. The term multifactor does not refer to the number of resources, devices, or groups with which the user is associated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many keys does a system that employs asymmetric encryption use?

None. Asymmetric encryption doesn’t require keys.

One. Asymmetric encryption uses one key for both encryption and decryption.

Two. Asymmetric encryption uses one key for encryption and another key for decryption.

A

Two. Asymmetric encryption uses one key for encryption and another key for decryption.

Asymmetric encryption uses two separate keys, one for encryption and one for decryption. In a public key infrastructure (PKI), each user, computer, or service has both a public key and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many keys does a system that employs symmetric encryption use?

None. Symmetric encryption doesn’t require keys.

One. Symmetric encryption uses one key for both encryption and decryption.

Two. Symmetric encryption uses one key for encryption and another key for decryption.

A

One. Symmetric encryption uses one key for both encryption and decryption.

Symmetric encryption uses one key, which the systems use for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following services are methods of tracking a user’s activities on a network? (Choose all correct answers.)

Authentication

Authorization

Accounting

Auditing

A

Accounting

Auditing

Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected. Authentication is the confirmation of a user’s identity, and authorization defines the type of access granted to authenticated users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a user supplies a password to log on to a server, which of the following actions is the user performing?

Authentication

Authorization

Accounting

A

Authentication

Authentication is the process of confirming a user’s identity. Passwords are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a user swipes a finger across a fingerprint scanner log on to a laptop computer, which of the following actions is the user performing?

Authentication

Authorization

Accounting

A

Authentication

Authentication is the process of confirming a user’s identity. Fingerprints and other biometric readers are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following security protocols can authenticate users without transmitting their passwords over the network?

Kerberos

802.1X

TKIP

A

Kerberos

Kerberos is a security protocol used by Active Directory that employs a system of tickets to authenticate users and other network entities without the need to transmit credentials over the network. IEEE 802.1X does authenticate by transmitting credentials. Temporal Key Integrity Protocol (TKIP) and Lightweight Directory Access Protocol (LDAP) are not authentication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following security procedures is often tied to group membership?

Authentication

Authorization

Accounting

A

Authorization

Authentication is the process of confirming a user’s identity. Authorization defines the type of access granted to authenticated users. In many instances, the authorization process is based on the groups to which a user belongs. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following standards is most commonly used to define the format of digital certificates?

802.1X

X.509

802.1q

A

X.509

X.509, published by the International Telecommunication Union’s Standardization sector (ITU-T), defines the format of digital certificates. X.500, another standard published by the ITU-T, defines functions of directory services. IEEE 802.1X is an authentication standard, and IEEE 802.1q defines the VLAN tagging format used on many network switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements about authentication auditing are not true?

Auditing can disclose attempts to compromise passwords.

Auditing can detect authentications that occur after hours.

Auditing can identify the guess patterns used by password cracking software.

A

Auditing can identify the guess patterns used by password cracking software.

Auditing of authentication activities can record both successful and unsuccessful logon attempts. Large numbers of logon failures can indicate attempts to crack passwords. Auditing tracks the time of authentication attempts, sometimes enabling you to detect off-hours logons that indicate an intrusion. Auditing does not record the passwords specified during authentications, so it cannot identify patterns of unsuccessful guesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following types of key is included in a digital certificate?

Public

Private

Preshared

A

Public

As part of a public key infrastructure (PKI), digital certificates are associated with a key pair, consisting of a public key and a private key. The public key is supplied with the certificate to any party authenticating the entity to which the certificate was issued. The private key is supplied to the entity with the certificate, but it is not distributed as part of the certificate. Preshared keys are not associated with certificates, and privileged keys do not exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a user swipes a smartcard through a reader to log on to a laptop computer, which of the following actions is the user performing?

Authentication

Authorization

Accounting

A

Authentication

Authentication is the process of confirming a user’s identity. Smartcards are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Combining elements like something you know, something you have, and something you are to provide access to a secured network resource is a definition of which of the following types of authentication?

Multifactor

Multisegment

Multimetric

A

Multifactor

Multifactor authentication combines two or more authentication methods and reduces the likelihood that an intruder would be able to successfully impersonate a user during the authentication process. A password (something you know) and a retinal scan (something you are) is an example of a multifactor authentication system. A smartcard and a PIN, which is the equivalent of a password, is another example of multifactor authentication because it requires users to supply something they know and something they have. Multisegment, multimetric, and multifiltered are not applicable terms in this context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does MAC address filtering increase the security of a wireless LAN?

By allowing traffic sent to or from specific MAC addresses through the Internet firewall

By substituting registered MAC addresses for unregistered ones in network packets

By permitting only devices with specified MAC addresses to connect to an access point

A

By permitting only devices with specified MAC addresses to connect to an access point

MAC address filtering enables administrators to configure an access point to allow only devices with specific addresses to connect; all other traffic is rejected. Access points broadcast their presence using an SSID, not a MAC address. MAC address filtering protects wireless LANs when implemented in an access point, not a firewall. MAC address filtering does not call for the modification of addresses in network packets

17
Q

Which of the following terms describes a system that prevents computers from logging on to a network unless they have the latest updates and antimalware software installed?

NAC

LDAP

RADIUS

A

NAC

Network Access Control is a mechanism that defines standards of equipment and configuration that systems must meet before they can connect to the network. Lightweight Directory Access Protocol (LDAP) provides communication between directory service entities. RADIUS is an authentication, authorization, and accounting service for remote users connecting to a network. Temporal Key Integrity Protocol (TKIP) with the RC4 cipher is an encryption protocol used on wireless networks running the Wi-Fi Protected Access (WPA) security protocol

18
Q

Which of the following statements best describes symmetric key encryption?

A cryptographic security mechanism that uses the same key for both encryption and decryption

A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data

A cryptographic security mechanism that uses two separate sets of public and private keys to encrypt and decrypt data

A

A cryptographic security mechanism that uses the same key for both encryption and decryption

Symmetric key encryption uses only one key both to encrypt and decrypt data. Asymmetric key encryption uses public and private keys. Security mechanisms that use multiple key sets are not defined as symmetric

19
Q

Which of the following is the best description of geofencing?

Something you have

Something you know

Somewhere you are

A

Somewhere you are

Geofencing is the generic term for a technology that limits access to a network or other resource based on the client’s location. It is therefore best described as somewhere you are. A finger gesture would be considered something you do, a password something you know, and a smartcard something you have

20
Q

Which of the following describes the primary difference between single sign-on and same sign-on?

Single sign-on requires the user to supply credentials only once, whereas with same sign-on, the user must supply the credentials repeatedly.

Single sign-on enables users to access different resources with one set of credentials, whereas same sign-on requires users to have multiple credential sets.

Single sign-on credentials consist of one username and one password, whereas same sign-on credentials consist of one username and multiple passwords.

A

Single sign-on requires the user to supply credentials only once, whereas with same sign-on, the user must supply the credentials repeatedly.

Single Sign On uses one set of credentials and requires the user to supply them only once to gain access to multiple resources. Same Sign On also uses a single set of credentials, with one password, but the user must perform individual logons for each resource. Neither Single Sign On nor Same Sign On requires multifactor authentication

21
Q

Which of the following is the best description of biometrics?

Something you know

Something you have

Something you are

A

Something you are

Biometrics is a type of authentication factor that uses a physical characteristic that uniquely identifies an individual, such as a fingerprint or a retinal pattern. Biometrics is therefore best described as something you are, as opposed to something you know, have, or do

22
Q

Which of the following authentication factors is an example of something you have?

A fingerprint

A smartcard

A password

A

A smartcard

Something you have refers to a physical possession that serves to identify a user, such as a smartcard. This type of authentication is typically used as part of a multifactor authentication procedure, because a smartcard or other physical possession can be lost or stolen. A fingerprint would be considered something you are, a password something you know, and a finger gesture something you do

23
Q

Which of the following statements best describes the primary scenario for the use of TACACS+?

TACACS+ was designed to provide authentication, authorization, and accounting services for the Active Directory directory service.

TACACS+ was designed to provide authentication, authorization, and accounting services for remote dial-up users.

TACACS+ was designed to provide authentication, authorization, and accounting services for network routers and switches.

A

TACACS+ was designed to provide authentication, authorization, and accounting services for network routers and switches.

Terminal Access Controller Access Control System Plus (TACACS+) is a protocol designed to provide AAA services for networks with many routers and switches, enabling administrators to access them with a single set of credentials. It was not designed to provide AAA services for wireless networks, Active Directory, or remote dial-in users

24
Q

Which of the following is not one of the functions provided by TACACS+?

Authentication

Authorization

Administration

A

Administration

Terminal Access Controller Access Control System Plus (TACACS+) is a protocol that was designed to provide AAA services for networks with many routers and switches. AAA stands for authentication, authorization, and accounting, but not administration

25
Q

The new door lock on your company’s datacenter door requires you to supply both a PIN and a thumbprint scan. Which of the following types of authentication factors does the lock use? (Choose all correct answers.)

Something you have

Something you know

Something you are

Something you do

A

Something you know

Something you are

A PIN, like a password, is something you know, and a thumbprint, or any other biometric factor, is something you are. An example of something you have would be a smartcard, and an example of something you do would be a finger gesture