Chapter 11
Authentication and Remote Access
Multiple Choice Questions
- (p. 285)What protocol would you use for remote access, to get a console with an encrypted connection?
A. SSH
B. Telnet
C. FTP
D. STP
Difficulty: Easy
- (p. 285)What does SSH stand for?
A. Simple Security Hardware
B. Secure Socket Help
C. Secure Shell
D. Scientifically Secure Hard Drive
Difficulty: Easy
- (p. 286)The three major components of the SSH protocol are the
A. Transport Layer Protocol, User Authentication Protocol, and Connection Protocol
B. User Datagram Protocol, User Authentication Protocol, and Connection Protocol
C. Transport Layer Protocol, User Encryption Protocol, and Connection Protocol
D. User Datagram Protocol, User Encryption Protocol, and Connection Protocol
Difficulty: Easy
- (p. 265)What does AAA stand for?
A. Awareness, Accounting, Available
B. Acceptable, Available, Activities
C. Acute, Awareness, Accounting
D. Authentication, Authorization, Accounting
Difficulty: Easy
- (p. 282)Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network?
A. PPPP
B. PPTP
C. PTPN
D. PPTN
Difficulty: Easy
- (p. 275)Which of the following describes the wireless standard?
A. 802.11
B. 854.12
C. 800.15
D. 756.10
Difficulty: Easy
- (p. 275)What does RADIUS stand for?
A. Real Access Device Invisible Users Solution
B. Rational Available Device Incremental Users Service
C. Remote Authentication Dial-In User Service
D. Remote Authentication Device Invisible Users Solution
Difficulty: Easy
- (p. 278)What does TACACS stand for?
A. Terminal Access Control of Authentication and Control Systems
B. Terminal Access Controller Access Control System
C. Television Availability Control And Communication Standard
D. Teletype Authentication and Control of All Control Systems
Difficulty: Easy
- (p. 280)What are the three types of accounting records in TACACS+?
A. Availability, Accounting, Confidentiality
B. Availability, Integrity, Confidentiality
C. Start, Stop, Update
D. Start, Stop, Delete
Difficulty: Easy
- (p. 266)In addition to “What users know,” “What users have,” and “What users are,” what did the author add to be able to authenticate a user?
A. “What users should have”
B. “What users should think”
C. “What users can argue they should be”
D. “What users do”
Reviews
There are no reviews yet.