Test Questions Chapter 4 Flashcards
What’s the difference between a digital certificate and a digital signature?
Digital signatures ensure the integrity of the message and who it is from. It verifies the trustworthiness of the data.
Certificates bind a signature to an entity (e.g. an external authority). It verifies the trustworthiness of the sender
Biometric Scans, identification badges and key fobs examples of of means of identifying authorized personnel from unauthorized personnel - true or false?
True
what out of the below can monitor all activities of users in a sensitive area?
1) Video surveillance
2) Identification badge
3) Motion detection
Video Surveillance
Video surveillance can prevent Evil Twin and Insider Threats - true or false?
True
A false positive is when a user who should not be granted access is - true or false?
True
Which Windows supported remote authentication protocol that supports the use of authentication methods other than the use of passwords, such as smartcards?
EAP
Which of the following services are methods of tracking a user’s activities on a network? (Choose all correct answers.)
A. Authentication B. Authorization C. Accounting D. Auditing
C. D.
Which of the following security protocols can authenticate users without transmitting their passwords over the network?
A. Kerberos B. 802.1X C. TKIP D. LDAP
A
TACACS+ was originally designed to provides AAA services to networks with what?
many routers and switches. It allowed admins to login using one set of credentials.
- It was NOT designed for remote access
- RADIUS was originally designed to provide AAA to ISPs and doesn’t provide AAA for routers and switches.
What is the name of the process whereby a client submits a request for a certificate?
Enrollment
in an 802.1x transaction, the authenticator is simply the devices to which the supplicant is requesting access, true or false?
True
Access control lists are used by Windows NTFS and Wireless Access Points - true or false?
True
RADIUS uses TCP true or false?
False, it uses UDP
40-bit encryption
24-bit initialization vector
static shared secret
are all weaknesses of what wireless security standard?
WEP
WPA uses TKIP
WPA2 uses AES
True or false
TRUE
EAP is used on wireless and point-to-point connections to encapsulate authentication messages using dozens of different authentication methods, true or false?
TRUE!