) Questions & Answers {Grade
A} 100% Correct
What does RADIUS stand for and what does it provide? - correct answer Remote
Access Dial-In User Service, both Authentication and Authorization
What does TACAS+ stand for? - correct answer Terminal Access Controller Access
Control Service Plus
Where does authentication across the network exist? - correct answer on the local
computer by default, but in an enterprise environment, it will be on a different server
In a domain environment, what is authenticated against? - correct answer the domain,
not the local machine
,How is authorization accomplished? - correct answer through rights and permissions
What level do group policies assign rights to? - correct answer system
What level do access control lists assign permissions to? - correct answer object
What is an access control list? - correct answer simplest method of providing
authorization, but requires a separate authentication method. they are attached
to/located on the resource
What do ACLs contain? - correct answer a list of authorized users and their
authorization levels
When do "share" permissions apply? - correct answer when the resource is accessed
over a network
,What 3 servers does Kerberos require? - correct answer one authentication server,
one ticket granting server, and at least one application server
What is the basic concept of Kerberos? - correct answer If a secret is known by only
two people, either person can verify the identity of the other by confirming that the
other person knows the secret.
What is the purpose of a Kerberos Realm? - correct answer admins create the realms
which encompass all that is available to access. a realm defines what Kerberos
manages in terms of who can access what.
What is within a Kerberos Realm? - correct answer Within the realm is the Client and
the service/host machine to which they requested access. There is also the Key
Distribution Center which hold the Authentication S and TGS
, In Kerberos, when requesting access to a service or host, three interactions take place
between you and: - correct answer the Authentication Server, the Ticket Granting
Server, and the Service or host machine that you're wanting access to
What will you receive with each interaction in Kerberos? - correct answer Two
messages. Each message is one that you can decrypt, and one that you can not.
In Kerberos, does the service/machine you are requesting access to communicate
directly with the KDC? - correct answer No, they do not!
Where are all the secret keys for user machines and services stored in Kerberos? -
correct answer the KDC