SEC+ Revision Questions Authentication Flashcards
Before accessing computer systems, a government agency requires users to swipe a card through a keyboard-embedded card reader and then provide a PIN. What is this an example of?
A. Bi-factor authentication
B. Biometric authentication
C. Location-based authentication
D. Multifactor authentication
D. Multifactor authentication
Your traveling users require secure remote access to corporate database servers. What should you configure for them?
A. Modem
B. WLAN
C. VPN
D. Intranet
C. VPN
You are the network administrator for a national marketing firm. Employees have frequent lengthy telephone conference calls with colleagues from around the country. To reduce costs, you have been asked to recommend replacement telephony solutions. Which of the following might you suggest?
A. Modem
B. VoIP
C. Internet text chat
D. E-mail
B. VoIP
You are an IT security consultant auditing a network. During your presentation of audit findings, one of your clients asks what can be used to prevent unauthorized LAN access. How do you answer the question?
A. NAC
B. Packet filtering firewall
C. PKI
D. SSL
A. NAC
What type of server authenticates users prior to allowing network access?
A. File server
B. Active Directory
C. RADIUS
D. Domain controller
C. RADIUS
Which of the following are examples of RADIUS clients? (Choose two.)
A. VPN client
B. 802.1x-capable switch
C. Wireless router
D. Windows 7 OS
E. Linux OS
B. 802.1x-capable switch
&
C. Wireless router
Which of the following are true regarding TACACS+? (Choose three.)
A. It is compatible with TACACS.
B. It is compatible with RADIUS.
C. It is a Cisco proprietary protocol.
D. It can be used as an alternative to RADIUS.
E. TACACS+ uses TCP.
C. It is a Cisco proprietary protocol.
&
D. It can be used as an alternative to RADIUS.
&
E. TACACS+ uses TCP.
You are the network administrator for a UNIX network. You are planning your network security. A secure protocol must be chosen to authenticate all users logging in. Which is a valid authentication protocol choice?
A. TCP
B. Telnet
C. Kerberos
D. AES
C. Kerberos
A client asks you to evaluate the feasibility of a Linux client and server operating system environment. The primary concern is having a central database of user and computer accounts capable of secure authentication. What Linux options should you explore?
A. NFS
B. SSH
C. Samba
D. LDAP
D. LDAP
You are configuring a Cisco network authentication appliance. During configuration, you are given a list of authentication choices. Which choice provides the best security and reliability?
A. RADIUS
B. TACACS
C. TACACS+
D. XTACACS
C. TACACS+
A user enters their logon name to gain network access. To which of the following terms would this example apply?
A. Identification
B. Authorization
C. Auditing
D. Authentication
A. Identification
A user enters a logon name and password to gain network access. Choose the best description to which this applies.
A. Single-factor authentication
B. Dual-factor authentication
C. Multifactor authentication
D. Quasifactor authentication
A. Single-factor authentication
A corporation has invested heavily in the development of a much sought after product. To protect its investment, the company would like to ensure that only specific personnel can enter a research facility. Which of the following is considered the most secure?
A. Building access card
B. Voice scan
C. Fingerprint scanner
D. Retinal scanner
D. Retinal scanner
Which of the following is considered three-factor authentication?
A. Building access card/voice recognition scan
B. Building access card/username/password
C. Username/password/smartcard
D. Username/password/smartcard/PIN
D. Username/password/smartcard/PIN
To log on to a secured system, a user must enter a username, password, and passcode. The passcode is generated from a tiny handheld device and displayed on a tiny screen. What type of device is this?
A. Smartcard
B. PKI certificate
C. Key fob
D. VPN
C. Key fob