Upgrade to remove ads
CIS 3500 CH19
Terms in this set (15)
You are working with a development group on a new web application that will be hosted in the cloud. They need single sign-on capability to exchange authentication and authorization data between multiple security domains and they prefer working with XML. What would you suggest they use?
SAML (Security Assertion Markup Language)
A colleague has been tasked to update the authentication protocols for a very old wWindows-based application running on a stand-alone system -- it's still using LANMAN and running on Windows XP. The colleague would prefer to keep using something from Microsoft, but she can't upgrade the OS past Windows 7 during the effort. Which of the following would you suggest she use?
NTLM (NT LAN Manager)
Which of the following protocols uses a key distribution center and can securely pass a symmetric key over an insecure network?
Your colleague is preparing to talk about TACACS+ authentication and the exchange sequence. He is having trouble remembering the three different packet types used in the authentication process. Which of the following is not one of the three packet types used in TACACS+ authentication?
While helping to catalog older servers in your data center, you come across a RADIUS accounting server. Your supervisor asks you what RADIUS accounting was typically used for. You tell him it was used mainly for which of the following?
A. Source and destination UP addresses of the network traffic.
B. Applications used by the users.
C. Time billing and security logging
D. Tracking file access
Time billing and security logging
Your development team needs an authentication solution that supports authentications access stateless platforms. They want you to explain how other applications use Facebook or Google logins for authentications. In your explanation, which of the following concepts would you definitely need to mention?
A. Secure tokens
B. Secure tickets
C. XML requests
D. Request packets
You are establishing a point-to-point link and need to provide authentication using PPP. Which of the following protocols would you consider?
D. TCP Auth
CHAP (Challenge Handshake Authentication Protocol)
What does RADIUS stand for?
Remote Authentication Dial-In User Service
Which of the following statements regarding TACACS+ is true?
A. Communication between a TACACS+ client (typically a NAS) and a TACACS+ server are not secure.
B. Communications between a user (typically a PC) and the TACACS+ client are subject to compromise as communications are usually not encrypted.
C. TACACS+ is an extension of TACACS and is backward compatible
D. TACACS+ uses UDP for its transport protocol.
Communications between a user (typically a PC) and the TACACS+ client are subject to compromise as communications are usually not encrypted.
Which of the following protocols involves a two way handshake and sends the username and password in clear text?
PAP (Password Authentication Protocol)
OpenID connect allows for which of the following?
A. A third party can authenticate your users for you using accounts the users already have.
B. Symmetric keys can be shared across unsecured networks.
C. Identity can be confirmed with a single UDP packet.
D. Trusted IP addresses can be used to mitigate brute force attacks.
A third party can authenticate your users for you using accounts the users already have.
Your IT group is reworking their user authentication and authorization capabilities. They need something that can be used to control access to objects as well as handle user authentication and authorization. Which of the following protocols would you suggest they use?
Which of the following is a service designed to enable single sign on and federated identity based authentication and authorization across networks?
Which of the following is a true statement about the NTLM protocol?
A. It uses an encrypted challenge/response protocol to authenticate a user.
B. It passes user credentials in clear text only.
C. It is commonly used to integrate Unix services into a network.
D. It is typically used on stand alone systems.
It uses an encrypted challenge/response protocol to authenticate a user.
Which of the following is an open protocol that allows secure token-based authentication and authorization from web, desktop, and mobile applications and is used by companies such as Google and Microsoft to permit the users to share information about their accounts with third party applications?
OAuth (Open Authorization)
THIS SET IS OFTEN IN FOLDERS WITH...
CIS 3500 CompTIA Security+ Chapter 11
CIS 3500 CH22 (Quiz Questions)
CIS 3500 CH12 (Quiz Questions)
CIS 3500 CH13 (Quiz Questions)
YOU MIGHT ALSO LIKE...
Network+ 8.5: Authentication
Network+ Practice Questions Volume A
Foundations Study set
OTHER SETS BY THIS CREATOR
CIS-4500-CH 5 Flash Cards
CIS-4500-CH 4 Flash Cards