Create an account
Which of the following authentication protocols uses a three-way handshake to authenticate users to the network?
When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?
You want to increase the security of your network by allowing authenticated users to be able to access network devices through a switch.
Which of the following should you implement?
Which of the following is a feature of MS CHAP v2 that is not included in CHAP?
Which of the following are used when implementing Kerberos for authentication and authorization?
Ticket granting server.
You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?
You have been contracted by a firm to implement a new remote access solution based on a Windows Server 2003 system. The customer wants to purchase and install a smartcard system to provide a high level of security to the implementation.
Which of the following authentication protocols are you most likely to recommend to the client?
Which of the following applications typically uses 802.1x authentication?
Controlling access through a wireless access point.
Controlling access through a switch.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together