Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT Show
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (33)Authn is short for ________. Authentication Which of the following are valid multi-factor authentication factors? Check all that apply. Something you know Security Keys utilize a secure challenge-and-response authentication system, which is based on ________. Public key cryptography The
authentication server is to authentication as the ticket granting service is to _______. Authorization Your bank set up multifactor authentication to access your account online. You know your password. What other factor combined with your password qualifies for multifactor authentication? Check all that
apply. Bank card A Lightweight Directory Access Protocol (LDAP) uses a _____ structure to hold directory objects. Data Information Tree A systems administrator is designing a directory
architecture to support Linux servers using Lightweight Directory Access Protocol (LDAP). The directory needs to be able to make changes to directory objects securely. Which of these common operations supports these requirements? StartTLS, delete. What are the benefits of using a Single Sign-On (SSO) authentication service? Check all that
apply. Reduce overhead of password assistance In the three As of security, which
part pertains to describing what the user account does or doesn't have access to? Authorization A(n) _____ defines permissions or authorizations for objects. Access Control List What does a Terminal Access Controller Access Control System Plus (TACACS+) keep track of? Check all that apply. Track user authentication Authentication is concerned with determining
_______. Identity The two types of one-time-password tokens are ______ and ______. Check all that apply. Time-based In the three As of security, what is the process of proving who you claim to
be? Authentication A network admin wants to use a Remote Authentication Dial-In User Service (RADIUS) protocol to allow 5 user accounts to connect company laptops to an access point in the office. These are generic users and will not be updated often. Which of these internal sources would be appropriate to store these accounts in? ... Kerberos enforces strict _____ requirements, otherwise authentication will fail. Time Which of these are examples of an access control system? Check all that apply. TACACS+ A company is utilizing Google Business applications for the marketing department. These applications should be able to temporarily access a user's email account to send links for review. Why should the company use Open Authorization (OAuth) in this situation? Compatibility with third party apps An organization needs to setup a(n) _____ infrastructure to issue and sign client certificates. CA What is used to request access to services in the Kerberos process? Ticket Granting Ticket Which of these are examples of a Single Sign-On (SSO) service? Check all that apply. Kerberos A network admin deployed a Terminal Access Controller Access Control System Plus (TACACS+) system so other admins can properly manage
multiple switches and routers on the local area network (LAN). The system will keep track and log admin access to each device and the changes made. This "logging" satisfies which part of the three As of security? Accounting Authz is short for ________. Authorization Authorization is concerned with determining ______ to resources. Access Security Keys are more ideal than OTP generators because they're resistant to _______ attacks. Phishing Multiple client
switches and routers have been set up at a small military base. The network team decided to implement Terminal Access Controller Access-Control System Plus (TACACS+), along with Kerberos, and an external Lightweight Directory Access Protocol (LDAP) service. What is the primary reason TACACS+ was chosen for this? Device administration In
addition to the client being authenticated by the server, certificate authentication also provides ______. Server authentication In a Certificate Authority (CA) infrastructure, why is a client certificate used? ... An Open Authorization (OAuth) access token would have a _____ that tells what the third party app has access to. ... Which of these passwords is the strongest for authenticating to a system? P@w04d!$$L0N6 Access control entries can be created for what types of file system objects? Check all that apply. Folders Kerberos uses _____ as authentication tokens. tickets Which of these are examples of "something you have" for multifactor authentication? Check all that apply. RSA / Ping / OTP Sets with similar termsChapter 5 Vocab - ISEC46 terms madison_cook64 ISEC Chapter 5 Vocabulary45 terms jglove42 Chapter 1127 terms asoto0890 SY0-401:5 TS Quiz Access Control and Identity Mana…54 terms Berevan_Omer Sets found in the same folderIT Security: Defense against the digital dark arts…27 terms snramos10 Week 1 - Understanding Security Threats40 terms heathersisson IT Security: Defense against the digital dark arts…20 terms snramos10 WEEK 5:: SYSTEM HARDENING10 terms dojikerze Other sets by this creatorWeek 6 - Creating a Company Culture for Security28 terms heathersisson Week 5 - Defense in Depth24 terms heathersisson Data Recovery & Backups31 terms heathersisson US History 190 terms heathersisson Other Quizlet setsCh 12 - AIS27 terms Auntdede22 Post-Assessment Exam75 terms ouyangmao6 Mod 6, day 596 terms toxicblyssPLUS Sec + terms unknown34 terms wt34038 Related questionsQUESTION If a hacker can take over an application, then he or she receives how much permission that the operating system gave to the application. 2 answers QUESTION The -O switch in the Nmap commands you ran in this lab (for example, nmap -O -v 10.20.100.50) instructed Nmap to: 10 answers QUESTION In the TCP/IP stack, what layer is concerned with physically moving bits across the network's medium? 15 answers QUESTION How does a standard hub differ from a standard switch? 15 answers What is used to request access to services in the Kerberos?To request access to a specific service, the client must first have obtained a credential for the ticket-granting service from the authentication server, and a server credential from the ticket-granting service. See Obtaining a Credential for the Ticket-Granting Service and Obtaining a Credential for a Server.
Which of these are example of something you have for multifactor authentication?A multi-factor authentication example of something the user has could include:. Google Authenticator (an app on your phone).. SMS text message with a code.. Soft token (also called software token).. Hard token (also called hardware token).. Security badge.. What does a Kerberos authentication server issue to a client that successfully authenticates?What does a Kerberos authentication server issue to a client that successfully authenticates? ticket-granting ticket; Once authenticated, a Kerberos client receives a ticket-granting ticket from the authentication server.
What does Tacacs keep track of?The TACACS+ protocol provides detailed accounting information and flexible administrative control over the authentication, authorization, and accounting process.
|