Which of the following authentication protocols uses a three-way handshake to authenticate users to the network?
When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?
You want to increase the security of your network by allowing authenticated users to be able to access network devices through a switch.
Which of the following should you implement?
Which of the following is a feature of MS CHAP v2 that is not included in CHAP?
Which of the following are used when implementing Kerberos for authentication and authorization?
Ticket granting server.
You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?
You have been contracted by a firm to implement a new remote access solution based on a Windows Server 2003 system. The customer wants to purchase and install a smartcard system to provide a high level of security to the implementation.
Which of the following authentication protocols are you most likely to recommend to the client?
Which of the following applications typically uses 802.1x authentication?
Controlling access through a wireless access point.
Controlling access through a switch.