You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. |
Port authentication. |
Which of the following is a mechanism for granting and validating certificates? |
PKI |
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? |
TACACS+ RADIUS |
You want to implement an authentication method that uses public and private key pairs. Which authentication methods should you use? |
EAP |
You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL. |
Obtain a certificate from a public PKI |
Which of the following are used when implementing Kerberos for authentication and authorization? Select two |
Time server Ticket granting server |
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. |
Configure the remote access server as RADIUS clients |
You want to increase security of your network by allowing only authenticated users to be able to access network devices through a switch. |
802.1x |
Which of the following features of MS-CHAP v2 that is not included in CHAP? |
Mutual authentications |
Which of the following identifications and authentication factors are often well-know or easy to discover by others on the same network or system? |
Username |
Which of the following is the strongest form of multi-factor authentications? |
A password, a biometric scan, and a token device |
Which of the following is an example of two-factor authentications? |
A token device and a pin |
Which of the following is an example of three-factor authentication? |
Token device, keystroke analysis, cognitive question |
Which of the following are examples of Type 2 authentication credentials? select two |
Smart card Photo ID |
Match the authentication factor types on the left with the appropriate authentication factor on the right. |
Pin Something you know Smartcard something you have Password Something you know Retina scan Something you are Fingerprint scan Something you are Hardware token Something you have User name Something you know Voice récognition Something you are WI-FI triangulation Somewhere you are Typing behaviors Something you do |