You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch.
You want to make sure that visitors cannot plug their computers to the free network and connect to the network. However, employees who plug into those same jacks should be able to connect to the network.
What feature should you configure?
answer
Port authentication.
question
Which of the following is a mechanism for granting and validating certificates?
answer
PKI
question
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access?
answer
TACACS+
RADIUS
question
You want to implement an authentication method that uses public and private key pairs. Which authentication methods should you use?
answer
EAP
question
You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL.
Which method would you use to get a certificate for the server?
answer
Obtain a certificate from a public PKI
question
Which of the following are used when implementing Kerberos for authentication and authorization? Select two
answer
Time server
Ticket granting server
question
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization.
Which of the following would be a required part of your configurations?
answer
Configure the remote access server as RADIUS clients
question
You want to increase security of your network by allowing only authenticated users to be able to access network devices through a switch.
Which of the following should you implement?
answer
802.1x
question
Which of the following features of MS-CHAP v2 that is not included in CHAP?
answer
Mutual authentications
question
Which of the following identifications and authentication factors are often well-know or easy to discover by others on the same network or system?
answer
Username
question
Which of the following is the strongest form of multi-factor authentications?
answer
A password, a biometric scan, and a token device
question
Which of the following is an example of two-factor authentications?
answer
A token device and a pin
question
Which of the following is an example of three-factor authentication?