13.5.6 Practice Exam

9 September 2022
4.7 (114 reviews)
15 test answers

Unlock all answers in this set

Unlock answers (11)
question
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug their computers to the free network and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?
answer
Port authentication.
question
Which of the following is a mechanism for granting and validating certificates?
answer
PKI
question
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access?
answer
TACACS+ RADIUS
question
You want to implement an authentication method that uses public and private key pairs. Which authentication methods should you use?
answer
EAP
question
You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?
answer
Obtain a certificate from a public PKI
question
Which of the following are used when implementing Kerberos for authentication and authorization? Select two
answer
Time server Ticket granting server
question
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following would be a required part of your configurations?
answer
Configure the remote access server as RADIUS clients
question
You want to increase security of your network by allowing only authenticated users to be able to access network devices through a switch. Which of the following should you implement?
answer
802.1x
question
Which of the following features of MS-CHAP v2 that is not included in CHAP?
answer
Mutual authentications
question
Which of the following identifications and authentication factors are often well-know or easy to discover by others on the same network or system?
answer
Username
question
Which of the following is the strongest form of multi-factor authentications?
answer
A password, a biometric scan, and a token device
question
Which of the following is an example of two-factor authentications?
answer
A token device and a pin
question
Which of the following is an example of three-factor authentication?
answer
Token device, keystroke analysis, cognitive question
question
Which of the following are examples of Type 2 authentication credentials? select two
answer
Smart card Photo ID
question
Match the authentication factor types on the left with the appropriate authentication factor on the right.
answer
Pin Something you know Smartcard something you have Password Something you know Retina scan Something you are Fingerprint scan Something you are Hardware token Something you have User name Something you know Voice récognition Something you are WI-FI triangulation Somewhere you are Typing behaviors Something you do