PREVIOUS QUESTION & ANSWER

Q :
A :

 ·         Question 1

10 out of 10 points

   

Correct

What is Remote Authentication Dial-In User Service (RADIUS)?

     

Selected Answer:

 A client/server protocol that provides authentication, authorization, and accounting for a remote dial-in system.

Answers:

A protocol that sets up a point-to-point connection between two computer systems over an Internet Protocol (IP) network.

 

As part of AAA, it provides the ability of a system to collect statistics on networks or users for auditing and billing purposes. This enables the tracking of systems usage, start and stop times of resources, and number of packets, as well as other metrics that identify what was used and for how long.

 

 A client/server protocol that provides authentication, authorization, and accounting for a remote dial-in system.

 

A tunneling protocol that encapsulates packets inside Internet Protocol (IP) tunnels.

     

·         Question 2

10 out of 10 points

   

Correct

The Internet Protocol Security (IPSec) protocol provides the method for establishing a _________ channel.

     

Selected Answer:

 secure

Answers:

closed

 

 secure

 

connection

 

corporate network

     

·         Question 3

10 out of 10 points

   

Correct

There are multiple ways an organization can provide remote access identification, authentication, and authorization through _________.

     

Selected Answer:

 protocols

Answers:

access controls

 

technologies

 

 protocols

 

unicast

     

·         Question 4

10 out of 10 points

   

Correct

What is meant by assessment?

     

Selected Answer:

 Documenting rules, procedures, and guidelines to be tested against a system.

Answers:

Activities that occur between two or more businesses.

 

Provides services for connecting network resources across network domains.

 

 Documenting rules, procedures, and guidelines to be tested against a system.

 

The encryption key that is held privately by the user.

     

·         Question 5

10 out of 10 points

   

Correct

ISO is not associated with any government entity but works with the public and private sectors.

     

Selected Answer:

True

Answers:

True

 

False

     

·         Question 6

10 out of 10 points

   

Correct

What is meant by authentication, authorization, and accounting ( AAA)?

     

Selected Answer:

Network services that provide security through a framework of access controls and policies, enforcement of policies, and information needed for billing purposes.

Answers:

A protocol that provides the framework for the negotiation of algorithms, protocols, modes, and keys for IKE.

 

Network services that provide security through a framework of access controls and policies, enforcement of policies, and information needed for billing purposes.

 

A remote access client/server protocol that provides authentication and authorization capabilities to users whoare accessing the network remotely. It is not a secure protocol.

 

Sets up a point-to-point connection between two computer systems that can be transmitted over multiple types of networks.

     

·         Question 7

10 out of 10 points

   

Correct

Which of the following is the definition of baseline?

     

Selected Answer:

 A normal level of measurement.

Answers:

 A normal level of measurement.

 

A process that performs a sequence of operations.

 

Provides services for connecting network resources across network domains.

 

Activities that occur between two or more businesses.

     

·         Question 8

10 out of 10 points

   

Correct

RADIUS encrypts the password only, whereas TACACS+ encrypts the entire body of the packet.

     

Selected Answer:

True

Answers:

True

 

False

     

·         Question 9

10 out of 10 points

   

Correct

System access controls lists (SACLs) do not identify which users have access to systems and what rights they have once each system is accessed.

     

Selected Answer:

False

Answers:

True

 

False

     

·         Question 10

10 out of 10 points

   

Correct

Multiple layers provide multiple road blocks for ________.

     

Selected Answer:

 both a user and an attacker

Answers:

a user

 

an attacker

 

multiple users

 

 both a user and an attacker

     

·         Question 11

10 out of 10 points

   

Correct

Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data needed to ensure that systems are available.

     

Selected Answer:

 network

Answers:

baseline

 

infrastructure

 

applications

 

 network

     

·         Question 12

10 out of 10 points

   

Correct

________ provides a service to dial-in users and allows a computer system to connect to the network through either a phone line or the Internet.

     

Selected Answer:

 Network access server (NAS)

Answers:

 Network access server (NAS)

 

Security association (SA)

 

Remote access server (RAS)

 

Internet Key Exchange (IKE)

     

·         Question 13

10 out of 10 points

   

Correct

Which of the following is the definition of Internet Protocol Security ( IPSec)?

     

Selected Answer:

 A protocol that secures IP communications by authenticating and encrypting each IP packet.

Answers:

A remote access client/server protocol. It is a Cisco proprietary protocol and provides authentication, authorization, and accounting.

 

Authentication and encryption protocol for IPSec that encrypts Internet Protocol (IP) packets and ensures their integrity.

 

A protocol for communication between two computers. Typically, the connection from the client to the server is over a telephone line.

 

 A protocol that secures IP communications by authenticating and encrypting each IP packet.

     

·         Question 14

10 out of 10 points

   

Correct

After passing through most of the layers of access control, limiting access to the data itself is your last method of protecting it.

     

Selected Answer:

True

Answers:

True

 

False

     

·         Question 15

10 out of 10 points

   

Correct

Authentication Header ( AH) means an IPSec authentication protocol that is used to prove the identity of the sender and ensure that the data has not been tampered with.

     

Selected Answer:

True

Answers:

True

 

False

     

·         Question 16

10 out of 10 points

   

Correct

What name is given to a server that provides an authentication service for users who are dialing into a network or accessing it from the Internet?

     

Selected Answer:

 remote access server (RAS)

Answers:

Terminal Access Controller Access Control System Plus (TACACS+)

 

 remote access server (RAS)

 

Password Authentication Protocol (PAP)

 

network access server (NAS)

     

·         Question 17

10 out of 10 points

   

Correct

________ sets up a point-to-point connection between two computer systems over an Internet Protocol (IP) network.

     

Selected Answer:

 Point-to-Point Tunneling Protocol (PPTP)

Answers:

 Point-to-Point Tunneling Protocol (PPTP)

 

Accounting

 

Layer 2 Tunneling Protocol (L2TP)

 

Internet Security Association and Key Management Protocol (ISAKMP)

     

·         Question 18

10 out of 10 points

   

Correct

Once authentication is completed, _________ can occur.

     

Selected Answer:

 authorization

Answers:

 authorization

 

connections

 

protocols

 

communication

     

·         Question 19

10 out of 10 points

   

Correct

Identity management programs often implement a _________system that facilitates the management of user accounts.

     

Selected Answer:

 single sign-on (SSO)

Answers:

certificate

 

 single sign-on (SSO)

 

digital certificate

 

standards

     

·         Question 20

10 out of 10 points

   

Correct

The benefits associated with AAA are increased security, increased control over the network, and the capability of auditing your network.

     

Selected Answer:

True

Answers:

True

 

False

     

 


Related Questions & Answer

Get Your Solution Free




Get Your Solution Paid




DEMO