quiz 8 Flashcards
Authentication is when a person’s identity is confirmed through the use of a specific system.
True—Authentication is when a person’s identity is confirmed or verified through the use of a specific system.
Authorization is when a person is in a state of being identified.
False—Authorization is when a user is given permission to access certain resources. Identification is when a person is in a state of being identified.
A smart card is an example of something a user knows.
. False—A smart card would be an example of something a user has. A password would be an example of something a user knows.
Identity proofing is an initial validation of an identity.
True—Identity proofing is an initial validation of an identity—for example, when people shows their ID.
An older type of door access system might use a proximity sensor.
True—Proximity sensors are used in many door access systems, although they are less secure than other available technologies.
Biometrics is an example of a logical authentication system.
False—Biometrics is the science of recognizing humans based on one or more physical characteristics. An example of a logical authentication system would be Kerberos.
Multifactor authentication is when a user can log in once and gain access to multiple
systems.
False—Multifactor authentication is when two or more types of authentication are used when dealing with a user attempting to access a system. Single sign-on is when a user can log in once yet gain access to multiple systems.
A false positive is when a system authenticates a user who should not be allowed to access that system.
True—A false positive is an authentication failure that enables a user access who should not be allowed to get in.
. In an 802.1X connection, the authenticator is software running on a workstation.
False—Software running on the workstation would be known as a supplicant. The authenticator is usually a wireless access point or switch.
Cisco created a proprietary version of EAP called LEAP.
True—Cisco created LEAP (lightweight EAP), which is proprietary.
Which of the following uses a two-way authentication system known as mutual authentication? A. LDAP B. Kerberos C. RADIUS D. 802.1X
B. Kerberos is an authentication protocol used in client/server environments, where each verifies the other’s identity, known as mutual authentication.
Which of the following commands enables you to synchronize a client’s time to a domain controller? A. net time B. netstat –an C. net stop D. sc config
A. Net time is the command you would use to synchronize time on a client computer to a domain controller.
Which port does terminal services use? A. 1812 B. 389 C. 3389 D. 1813
C. Terminal services uses Port 3389. RADIUS uses Port 1812 and 1813. LDAP uses Port 389.
Which of the following is the most secure? A. PAP B. CHAP C. MS-CHAP D. MS-CHAP2
D. MS-CHAP2 is the most secure authentication protocol listed. PAP is not secure at all because it sends passwords in clear text.
Which of the following are commonly used in VPN tunneling protocols? (Select the two best answers.) A. PPP B. PPTP C. TACACS D. L2TP
B and D. PPTP and L2TP are commonly used in VPN tunneling protocols.