networking2 Flashcards
Linux stores passwords in the ____ file in encrypted format.
a. /etc/pass c. /etc/passwd
b. /root/passwd d. /system/password
/etc/passwd
Public-Key Infrastructure (PKI) must be used for ____ authentication.
a. Kerberos c. RADIUS
b. 802.1x Wi-Fi d. certificate-based
certificate-based
In ____________________-based access controls, access is granted based on a set of rules specified by the central authority.
ANS: rule
___________ is the act of confirming the identity of a potential user.
ANS: Authentication
With ____________________ authentication, the firewall enables the authenticated user to access the desired resources for a specific period of time.
ANS: client
____________________ IP address mappings work best because some TACACS+ systems use the source IP address to create the encryption key.
ANS: Static
The ____________________ password system, which is a feature of the Linux operating system that enables the secure storage of passwords, stores them in another file that has restricted access.
ANS: shadow
MATCHING CHAPTER 3
A firewall is designed to prevent all attackers, viruses, and would-be intruders from entering a computer or computer network. T/F
F
Mobile devices such as laptops, PDAs, and smartphones blur the perimeter boundary. T/F
T
A properly configured firewall only allows authorized connection attempts to the ports on the network it protects.
T/F
T
A packet-filtering firewall installed on a TCP/IP-based network typically functions at the TCP level. T/F
F
Application-layer gateways can control the way applications inside the network access external networks by setting up proxy services. T/F
T
Firewalls provide ____ services by examining packet headers and allowing traffic that conforms to estalished rules to continue.
a. packet filtering c. application proxy
b. NAT d. TCP/IP
a. packet filtering
Firewalls can be used to host ____ to reduce server load and improve Web-site performance.
a. logging c. VPN
b. shielding hosts d. cached data
d. cached data