Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
13.5.6 Practice exam
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
8.4 Switch Security
Terms in this set (15)
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch.
You want to make sure that visitors cannot plug their computers to the free network and connect to the network. However, employees who plug into those same jacks should be able to connect to the network.
What feature should you configure?
Port authentication.
Which of the following is a mechanism for granting and validating certificates?
PKI
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access?
TACACS+
RADIUS
You want to implement an authentication method that uses public and private key pairs. Which authentication methods should you use?
EAP
You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL.
Which method would you use to get a certificate for the server?
Obtain a certificate from a public PKI
Which of the following are used when implementing Kerberos for authentication and authorization? Select two
Time server
Ticket granting server
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization.
Which of the following would be a required part of your configurations?
Configure the remote access server as RADIUS clients
You want to increase security of your network by allowing only authenticated users to be able to access network devices through a switch.
Which of the following should you implement?
802.1x
Which of the following features of MS-CHAP v2 that is not included in CHAP?
Mutual authentications
Which of the following identifications and authentication factors are often well-know or easy to discover by others on the same network or system?
Username
Which of the following is the strongest form of multi-factor authentications?
A password, a biometric scan, and a token device
Which of the following is an example of two-factor authentications?
A token device and a pin
Which of the following is an example of three-factor authentication?
Token device, keystroke analysis, cognitive question
Which of the following are examples of Type 2 authentication credentials? select two
Smart card
Photo ID
Match the authentication factor types on the left with the appropriate authentication factor on the right.
Pin
Something you know
Smartcard
something you have
Password
Something you know
Retina scan
Something you are
Fingerprint scan
Something you are
Hardware token
Something you have
User name
Something you know
Voice récognition
Something you are
WI-FI triangulation
Somewhere you are
Typing behaviors
Something you do
THIS SET IS OFTEN IN FOLDERS WITH...
13.1.4 Practice exam
15 terms
10.5.5 Practice Exam
4 terms
10.4.8 Practice exam
9 terms
6.2.5 Practice exam
3 terms
YOU MIGHT ALSO LIKE...
Network+ 8.5: Authentication
11 terms
NET215 WK4
70 terms
Network Security
63 terms
OTHER SETS BY THIS CREATOR
CompTIA Cloud+ set 3
460 terms
CompTIA Cloud+ set 2
815 terms
CompTIA Cloud+ set 1
1,059 terms
AWS Cloud set 3
901 terms
OTHER QUIZLET SETS
ACC340 - Exam 2
63 terms
Patient Assessment
67 terms
NFPA 13R
12 terms
GER/ HIST 278 Exam 1 - History Questions
22 terms