Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CNIT 242 Final Exam Review UPDATED ACTUAL QUESTIONS AND CORRECT ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
30
Cijfer
A+
Geüpload op
13-04-2026
Geschreven in
2025/2026

CNIT 242 Final Exam Review UPDATED ACTUAL QUESTIONS AND CORRECT ANSWERS What is authentication? - CORRECT ANSWER access this system?" What is authorization? - CORRECT ANSWER authenticated?" What is accounting? - CORRECT ANSWER of the resource are you using?" "Do you have the credentials necessary to "What do you have permission to do once "Once authorized to access a resource, how much How can authentication be accomplished? - CORRECT ANSWER - what you have - what you are What is two-factor authentication? - CORRECT ANSWER methods to prove an identify What are some types of identification? - CORRECT ANSWER - physical object (ie. ATM card) - biometrics - digital certificates - what you know uses two of the authentication - user ID (UID) What are some examples of proofs of identification? - CORRECT ANSWER - access code (ie. PIN number) - one-time tokens - biometrics - digital certificates - passwords

Meer zien Lees minder
Instelling
CNIT 242
Vak
CNIT 242

Voorbeeld van de inhoud

CNIT 242 Final Exam Review UPDATED
ACTUAL QUESTIONS AND CORRECT
ANSWERS
What is authentication? - CORRECT ANSWER "Do you have the credentials necessary to
access this system?"



What is authorization? - CORRECT ANSWER "What do you have permission to do once
authenticated?"



What is accounting? - CORRECT ANSWER "Once authorized to access a resource, how much
of the resource are you using?"



How can authentication be accomplished? - CORRECT ANSWER - what you know

- what you have

- what you are



What is two-factor authentication? - CORRECT ANSWER uses two of the authentication
methods to prove an identify



What are some types of identification? - CORRECT ANSWER - user ID (UID)

- physical object (ie. ATM card)

- biometrics

- digital certificates



What are some examples of proofs of identification? - CORRECT ANSWER - passwords

- access code (ie. PIN number)

- one-time tokens

- biometrics

- digital certificates

,How are user IDs typically created? - CORRECT ANSWER typically created according to
some algorithm



True/False: Ideally, a user ID should be an email address - CORRECT ANSWER false



What are some ways to ensure the proper application of user IDs and passwords? - CORRECT
ANSWER - don't write passwords down!!

- avoid easy to guess passwords (names of family members/pets, birthdates, etc)

- use at least EIGHT characters!



How often should passwords be changed? - CORRECT ANSWER - minimum 30 days

- 90 days is OPTIMAL



What are some password security recommendations? - CORRECT ANSWER - force periodic
password changes

- disallow the last x passwords

- mix case

- use non-alpha characters

- disallow plain English passwords



What is the password security tradeoff? - CORRECT ANSWER "The more strict the password
rules, the higher the chances users will violate the first rule of secure passwords."



What is the recommended minimum length for web passwords? - CORRECT ANSWER 10
characters



How do biometrics work? - CORRECT ANSWER - functions as both ID and proof of ID

- physiological

- behavioral

- issues with FALSE POSITIVES and FALSE NEGATIVES

, What is a digital certificate? - CORRECT ANSWER - encrypted data file that uses a Certificate
Authority to guarantee the identity of the holder (trust CA = trust certificate used by CA)

- also includes an ENCRYPTION KEY for secure transmissions



What is authentication compared against? - CORRECT ANSWER a known-good object



What is a domain logon? - CORRECT ANSWER - users in a domain environment will
authenticate against domain controller(s)

- login credentials stored in AD as an account object

- provided credentials are compared against those stored in AD

- each account object is assigned a Security Identifier (SID)



What is a security identifier (SID)? - CORRECT ANSWER - unique identifier that includes an
ID for the user, groups the user is a member of, and the domain to which the user is authenticating



What is remote authentication dial in user server (RADIUS)? - CORRECT ANSWER - usually
uses a network access server as RADIUS client

- uses RADIUS server as central authentication point

- server can point to other external sources such as a database, Kerberos, LDAP, AD server (separate
protocols used to remotely check credentials)

- can authenticate users of MULTIPLE device types

- uses UDP



What is terminal access controller access-control system (TACACS+)? - CORRECT
ANSWER - operationally SIMILAR to RADIUS

- uses TCP instead of UDP

- breaks each of AAA functions into SEPARATE process

- typically only used to access DEVICES, NOT workstations/servers



What is Diameter? - CORRECT ANSWER - successor to RADIUS

- uses TCP

- adds security (IPsec or TLS)

Geschreven voor

Instelling
CNIT 242
Vak
CNIT 242

Documentinformatie

Geüpload op
13 april 2026
Aantal pagina's
30
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
STANFORDTOPGRADES Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
53
Lid sinds
1 jaar
Aantal volgers
2
Documenten
6922
Laatst verkocht
3 dagen geleden
TOPSELLER

Hi there! I'm dedicated to sharing my high-quality study guides and helpful EXAM Materials to make your learning easier and more efficient. All my materials are well-organized and tailored to help you ace your courses. I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. Kindly don't hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded and fully guaranteed

Lees meer Lees minder
3.9

7 beoordelingen

5
3
4
1
3
2
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen