11 terms


8.5 Authentication
Which of the following authentication protocols uses a three-way handshake to authenticate users to the network?
When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?
Which of the following authentication methods uses tickets to provide single sign-on?
You want to increase the security of your network by allowing authenticated users to be able to access network devices through a switch.
Which of the following should you implement?
Which of the following is a feature of MS CHAP v2 that is not included in CHAP?
Mutual authentication.
Which of the following is a mechanism for granting and validating certificates?
Which of the following are used when implementing Kerberos for authentication and authorization?
Ticket granting server.
Time server.
You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?
You have been contracted by a firm to implement a new remote access solution based on a Windows Server 2003 system. The customer wants to purchase and install a smartcard system to provide a high level of security to the implementation.
Which of the following authentication protocols are you most likely to recommend to the client?
Which of the following applications typically uses 802.1x authentication?
Controlling access through a wireless access point.
Controlling access through a switch.
You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL.
Which method would you use to get a certificate for the server?
Obtain a certificate from a public PKI.