13.5.6 Practice exam

Your page rank:

Total word count: 435
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch.
You want to make sure that visitors cannot plug their computers to the free network and connect to the network. However, employees who plug into those same jacks should be able to connect to the network.
What feature should you configure?

Port authentication.

Which of the following is a mechanism for granting and validating certificates?


Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access?


You want to implement an authentication method that uses public and private key pairs. Which authentication methods should you use?


You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL.
Which method would you use to get a certificate for the server?

Obtain a certificate from a public PKI

Which of the following are used when implementing Kerberos for authentication and authorization? Select two

Time server Ticket granting server

You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization.
Which of the following would be a required part of your configurations?

Configure the remote access server as RADIUS clients

You want to increase security of your network by allowing only authenticated users to be able to access network devices through a switch.
Which of the following should you implement?


Which of the following features of MS-CHAP v2 that is not included in CHAP?

Mutual authentications

Which of the following identifications and authentication factors are often well-know or easy to discover by others on the same network or system?


Which of the following is the strongest form of multi-factor authentications?

A password, a biometric scan, and a token device

Which of the following is an example of two-factor authentications?

A token device and a pin

Which of the following is an example of three-factor authentication?

Token device, keystroke analysis, cognitive question

Which of the following are examples of Type 2 authentication credentials? select two

Smart card Photo ID

Match the authentication factor types on the left with the appropriate authentication factor on the right.

Pin Something you know Smartcard something you have Password Something you know Retina scan Something you are Fingerprint scan Something you are Hardware token Something you have User name Something you know Voice récognition Something you are WI-FI triangulation Somewhere you are Typing behaviors Something you do

Share This

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more


A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message