2.13

Your page rank:

Total word count: 665
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.) 802.1x
EAP
PKI
TACACS+
RADIUS
AAA

TACACS+ RADIUS

AAA stands for

authentication, authorization, and accounting

You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following would be a required part of your configuration? Obtain certificates from a public or private PKI.
Configure the remote access servers as RADIUS clients.
Configure remote access clients as RADIUS clients.
Configure the remote access servers as RADIUS servers.

Configure the remote access servers as RADIUS clients.

Which of the following are characteristics of TACACS+? (Select two.)
Uses TCP
Allows for a possible of two different servers, one for authentication and authorization, and another for accounting
Allows for a possible of three different servers, one each for authentication, authorization, and accounting
Uses UDP

Uses TCP port 49, Allows for a possible of three different servers, one each for authentication, authorization, and accounting

Which of the following are differences between RADIUS and TACACS+?
RADIUS uses TCP; TACACS+ uses UDP.
RADIUS encrypts the entire packet contents; TACACS+ only encrypts the password.
RADIUS supports more protocols than TACACS+.
RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers

RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers

Which of the following protocols can be used to centralize remote access authentication?
Kerberos
EAP
CHAP
TACACS
SESAME

TACACS

authentication protocols used between the client and the server

Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP

Kerberos and Secure European System for Applications in a MultiVendor Environment (SESAME) are ____ ___ protocols.

single signon

RADIUS is primarily used for what purpose? Managing RAID faulttolerant drive configurations
Controlling entry gate access using proximity sensors
Authenticating remote clients before access to the network is granted
Managing access to a network over a VPN

Authenticating remote clients before access to the network is granted

Which of the following is a characteristic of TACACS+? Supports only TCP/IP
Encrypts the entire packet, not just authentication packets
Requires that authentication and authorization are combined in a single server
Uses UDP ports 1812 and 1813

Encrypts the entire packet, not just authentication packets

TACACS+: Uses TCP port ___

49.

RADIUS uses Uses UDP ports ___ and ___

1812 and 1813.

Which of the following ports are used with TACACS?
22
49
50 and 51
1812 and 1813
3389

49

What does a remote access server use for authorization? Remote access policies
SLIP or PPP
CHAP or MSCHAP
Usernames and passwords

Remote access policies

Which of the following is the best example of remote access authentication? A user accesses a shared folder on a server
A user establishes a dialup connection to a server to gain access to shared resources
A user connects using Remote Desktop to a computer on the LAN
A user logs on to an ecommerce site that use SSL

A user establishes a dialup connection to a server to gain access to shared resources

Which of the following is a feature of MSCHAP v2 that is not included in CHAP? Hashed shared secret
Mutual authentication
Threeway handshake
Certificatebased authentication

Mutual authentication

CHAP performs which of the following security functions? Links remote systems together
Periodically verifies the identity of a peer using a threeway handshake
Allows the use of biometric devices
Protects usernames

Periodically verifies the identity of a peer using a threeway handshake

Which of the following authentication protocols transmits passwords in clear text, and is therefore considered too insecure for modern networks? RADIUS
CHAP
EAP
PAP

PAP

Which remote access authentication protocol periodically and transparently reauthenticates during a logon session by default?
EAP
PAP
Certificates
CHAP

CHAP

Which of the following authentication protocols uses a threeway handshake to authenticate users to the network? (Choose two.)
MSCHAP
PAP
CHAP
EA

MSCHAP CHAP

Extensible Authentication Protocol (EAP) supports a number of authentication methods including ___ and ___

smartcards and digital certificates.

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending