Network Security (3) Flashcards
Your new smartphone enables you to configure the lock screen with a picture of your husband, on which you draw eyes, nose, and a mouth with your finger to unlock the phone. This is an example of which of the following authentication factors?
Something you have
Something you know
Something you do
Something you do
The act of drawing on the screen with your finger is a gesture, which is an example of something you do. A PIN or a password is something you know; a thumbprint, or any other biometric factor, is something you are; and a smartcard is an example of something you have
Which of the following authentication factors is an example of something you do?
A fingerprint
A smartcard
A finger gesture
A finger gesture
Something you do refers to a physical action performed by a user, such as a finger gesture, which helps to confirm his or her identity. This type of authentication is often used as part of a multifactor authentication procedure because a gesture or other action can be imitated. A fingerprint would be considered something you are, a password something you know, and a smartcard something you have
Which of the following authentication factors is an example of something you know?
A fingerprint
A smartcard
A password
A password
Something you know refers to information you supply during the authentication process, such as a password or PIN. This is the most common type of authentication factor because it cannot be lost or stolen unless the user violates security policies. A fingerprint would be considered something you are, a finger gesture something you do, and a smartcard something you have
Which of the following authentication factors is an example of something you are?
A fingerprint
A smartcard
A password
A fingerprint
Something you are refers to a physical characteristic that uniquely identifies an individual, such as a fingerprint or other form of biometric. This type of authentication is often used as part of a multifactor authentication procedure because a biometric element can conceivably be compromised. A finger gesture would be considered something you do, a password something you know, and a smartcard something you have
Which of the following is an implementation of Network Access Control (NAC)?
RADIUS
802.1X
LDAP
802.1X
NAC is a set of policies that define security requirements that clients must meet before they are permitted to connect to a network. 802.1X is a basic implementation of NAC. RADIUS and TACACS+ are Authentication, Authorization, and Accounting (AAA) services. They are not NAC implementations themselves, although they can play a part in their deployment. Lightweight Directory Access Protocol (LDAP) provides directory service communications
Which of the following is the service responsible for issuing certificates to client users and computers?
DNS
AAA
CA
CA
A certification authority (CA) is the service that receives requests for certificate enrollment from clients and issues the certificates when the requests are approved. Domain Name System (DNS); Authentication, Authorization, and Accounting (AAA) services; and access control lists (ACLs) do not issue certificates
Which of the following is not one of the roles involved in an 802.1X transaction?
Supplicant
Authentication server
Authorizing agent
Authorizing agent
An 802.1X transaction involves three parties: the supplicant, which is the client attempting to connect to the network; the authenticator, which is a switch or access point to which the supplicant is requesting access; and the authentication server, which is typically a RADIUS implementation that verifies the supplicant’s identity. There is no party to the transaction called an authorizing agent
Which of the following terms describes the process by which a client user or computer requests that it be issued a certificate, either manually or automatically?
Authorization
Enrollment
Authentication
Enrollment
Enrollment is the process by which a client submits a request for a certificate from a certification authority (CA). The enrollment process can be automated and invisible to the user, or it can be a manual request generated using an application. Authorization and authentication, and certification are not terms used for certificate requests
In an 802.1X transaction, what is the function of the supplicant?
The supplicant is the service that issues certificates to clients attempting to connect to the network.
The supplicant is the network device to which the client is attempting to connect.
The supplicant is the client user or computer attempting to connect to the network.
The supplicant is the client user or computer attempting to connect to the network.
An 802.1X transaction involves three parties: the supplicant, which is the client attempting to connect to the network; the authenticator, which is a switch or access point to which the supplicant is requesting access; and the authentication server, which is typically a RADIUS implementation that verifies the supplicant’s identity. The supplicant is not involved in issuing certificates
In an 802.1X transaction, what is the function of the authenticator?
The authenticator is the service that issues certificates to clients attempting to connect to the network.
The authenticator is the service that verifies the credentials of the client attempting to access the network.
The authenticator is the network device to which the client is attempting to connect.
The authenticator is the network device to which the client is attempting to connect.
An 802.1X transaction involves three parties: the supplicant, which is the client attempting to connect to the network; the authenticator, which is a switch or access point to which the supplicant is requesting access; and the authentication server, which is typically a RADIUS implementation that verifies the supplicant’s identity. The authenticator is not involved in issuing certificates
An 802.1X transaction involves three roles: the supplicant, the authenticator, and the authentication server. Of the three, which role typically takes the form of a RADIUS implementation?
The supplicant
The authenticator
The authentication server
The authentication server
The authentication server role is typically performed by a Remote Authentication Dial-In User Service (RADIUS) server. In an 802.1X transaction, the supplicant is the client attempting to connect to the network, the authenticator is a switch or access point to which the supplicant is requesting access, and the authentication server verifies the client’s identity
Which of the following best describes an example of a captive portal?
A switch port used to connect to other switches
A web page with which a user must interact before being granted access to a wireless network
A series of two doors through which people must pass before they can enter a secured space
A web page with which a user must interact before being granted access to a wireless network
A captive portal is a web page displayed to a user attempting to access a public wireless network. The user typically must supply credentials, provide payment, or accept a user agreement before access is granted. A captive portal does not refer to a switch port, a secured entryway to a room, or a type of extortionate computer attack
A user attempting to connect to a Wi-Fi hotspot in a coffee shop is taken to a web page that requires her to accept an End User License Agreement before access to the network is granted. Which of the following is the term for such an arrangement?
Captive portal
Ransomware
Port security
Captive portal
A web page that prompts users for payment, authentication, or acceptance of a EULA is a captive portal. Ransomware is a type of attack that extorts payment. Port security and root guards are methods for protecting access to switch ports
Which of the following are standards that define combined authentication, authorization, and accounting (AAA) services? (Choose all correct answers.)
802.1X
RADIUS
TACACS+
LDAP
RADIUS
TACACS+
Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+) are both services that provide networks with authentication, authorization, and accounting. 802.1X provides only authentication, and Lightweight Directory Access Protocol (LDAP) provides communication between directory service entities
Which of the following standards was originally designed to provide authentication, authorization, and accounting services dial-up network connections?
RADIUS
TACACS+
Kerberos
RADIUS
Remote Authentication Dial-In User Service (RADIUS) was originally conceived to provide AAA services for Internet Service Providers (ISPs), which at one time ran networks with hundreds of modems providing dial-up access to subscribers. Terminal Access Controller Access Control System Plus (TACACS+) is a protocol that was designed to provide AAA services for networks with many routers and switches but not for dial-up connections. Kerberos and Lightweight Directory Access Protocol (LDAP) are not AAA services