Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CNIT 242 Final Exam UPDATED QUESTIONS AND CORRECT ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
70
Cijfer
A+
Geüpload op
13-04-2026
Geschreven in
2025/2026

CNIT 242 Final Exam UPDATED QUESTIONS AND CORRECT ANSWERS What does AAA stand for? - CORRECT ANSWER Accounting Authentication, Authorization, and What question does Authentication answer? - CORRECT ANSWER credentials necessary to access this system? What question does Authorization answer? - CORRECT ANSWER do you have permission to do? What question does Accounting answer? - CORRECT ANSWER resource, how much of the resource are you using? Do you have the Once authenticated, what Once authorized to access a Authentication can be accomplished using any of what 4 qualifications? - CORRECT ANSWER What you know, what you have, what you are, where you are What is two-factor authentication? - CORRECT ANSWER qualifications to prove an identity. Using two of the 4 authentication What 2 steps does the authentication process involve? - CORRECT ANSWER and proof of identification What are ways to provide identification? - CORRECT ANSWER Identification User ID, physical object (such as ATM card), biometrics, digital certificates What are ways to provide proof of identification? - CORRECT ANSWER codes, one-time tokens, biometrics, digital certificates What are strategic ways to develop user IDs? - CORRECT ANSWER passwords, access

Meer zien Lees minder
Instelling
CNIT 242
Vak
CNIT 242

Voorbeeld van de inhoud

CNIT 242 Final Exam UPDATED
QUESTIONS AND CORRECT ANSWERS
What does AAA stand for? - CORRECT ANSWER Authentication, Authorization, and
Accounting



What question does Authentication answer? - CORRECT ANSWER Do you have the
credentials necessary to access this system?



What question does Authorization answer? - CORRECT ANSWER Once authenticated, what
do you have permission to do?



What question does Accounting answer? - CORRECT ANSWER Once authorized to access a
resource, how much of the resource are you using?



Authentication can be accomplished using any of what 4 qualifications? - CORRECT
ANSWER What you know, what you have, what you are, where you are



What is two-factor authentication? - CORRECT ANSWER Using two of the 4 authentication
qualifications to prove an identity.



What 2 steps does the authentication process involve? - CORRECT ANSWER Identification
and proof of identification



What are ways to provide identification? - CORRECT ANSWER User ID, physical object (such
as ATM card), biometrics, digital certificates



What are ways to provide proof of identification? - CORRECT ANSWER passwords, access
codes, one-time tokens, biometrics, digital certificates



What are strategic ways to develop user IDs? - CORRECT ANSWER computer generated
(NEVER simple names), sometimes created to some algorithm, NEVER use the same as email
address

,True or False: UID / password combo can be a powerful method of authentication if properly
managed - CORRECT ANSWER True



What is the number one rule of password security? - CORRECT ANSWER DON'T WRITE
PASSWORDS DOWN



What is the security tradeoff with password? - CORRECT ANSWER The more strict the
password rules, the higher the chances users will violate the first rule of secure passwords



What are biometrics? - CORRECT ANSWER authentication. functions as both ID and proof of
ID, separated into physiological and behavioral



What are digital certificates? - CORRECT ANSWER a form of authentication. encrypted data
files that uses a Certificate Authority to guarantee the identity of the holder



What does RADIUS stand for and what does it provide? - CORRECT ANSWER Remote
Access Dial-In User Service, both Authentication and Authorization



What does TACAS+ stand for? - CORRECT ANSWER Terminal Access Controller Access
Control Service Plus



Where does authentication across the network exist? - CORRECT ANSWER on the local
computer by default, but in an enterprise environment, it will be on a different server



In a domain environment, what is authenticated against? - CORRECT ANSWER the domain,
not the local machine



How is authorization accomplished? - CORRECT ANSWER through rights and permissions



What level do group policies assign rights to? - CORRECT ANSWER system



What level do access control lists assign permissions to? - CORRECT ANSWER object

,What is an access control list? - CORRECT ANSWER simplest method of providing
authorization, but requires a separate authentication method. they are attached to/located on the
resource



What do ACLs contain? - CORRECT ANSWER a list of authorized users and their
authorization levels



When do "share" permissions apply? - CORRECT ANSWER when the resource is accessed
over a network



What 3 servers does Kerberos require? - CORRECT ANSWER one authentication server, one
ticket granting server, and at least one application server



What is the basic concept of Kerberos? - CORRECT ANSWER If a secret is known by only
two people, either person can verify the identity of the other by confirming that the other person
knows the secret.



What is the purpose of a Kerberos Realm? - CORRECT ANSWER admins create the realms
which encompass all that is available to access. a realm defines what Kerberos manages in terms of
who can access what.



What is within a Kerberos Realm? - CORRECT ANSWER Within the realm is the Client and
the service/host machine to which they requested access. There is also the Key Distribution Center
which hold the Authentication S and TGS



In Kerberos, when requesting access to a service or host, three interactions take place between you
and: - CORRECT ANSWER the Authentication Server, the Ticket Granting Server, and the
Service or host machine that you're wanting access to



What will you receive with each interaction in Kerberos? - CORRECT ANSWER Two
messages. Each message is one that you can decrypt, and one that you can not.



In Kerberos, does the service/machine you are requesting access to communicate directly with the
KDC? - CORRECT ANSWER No, they do not!

, Where are all the secret keys for user machines and services stored in Kerberos? - CORRECT
ANSWER the KDC



What are secret keys (in Kerberos)? - CORRECT ANSWER passwords plus a salt that are
hashed



True or False: There are passwords on the services/host machines that use Kerberos. - CORRECT
ANSWER False



What happens during the set up of Kerberos? - CORRECT ANSWER hash algorithm is chosen
for secret keys, admin choses a key for the service/host machine to memorize



What type of cryptography does Kerberos use? - CORRECT ANSWER symmetric/private key,
but can be configured to use public key



How is the KDC protected? - CORRECT ANSWER it itself is encrypted with a master key



What are traits of TACAS? - CORRECT ANSWER Cisco-proprietary, TCP, AAA are separate
processes



What are traits of RADIUS? - CORRECT ANSWER Open standard, UDP, combines
Authentication and Authorization, only encrypts password



What are traits of Kerberos? - CORRECT ANSWER Authentication only, no Authorization or
Accounting



What standard does naming in AD follow? - CORRECT ANSWER LDAP standard



What needs to be formed among domain trees (explicitly or implicitly) to build a domain forest? -
CORRECT ANSWER trust relationships

Geschreven voor

Instelling
CNIT 242
Vak
CNIT 242

Documentinformatie

Geüpload op
13 april 2026
Aantal pagina's
70
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
STANFORDTOPGRADES Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
51
Lid sinds
1 jaar
Aantal volgers
2
Documenten
6887
Laatst verkocht
2 dagen geleden
TOPSELLER

Hi there! I'm dedicated to sharing my high-quality study guides and helpful EXAM Materials to make your learning easier and more efficient. All my materials are well-organized and tailored to help you ace your courses. I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. Kindly don't hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded and fully guaranteed

Lees meer Lees minder
4.2

6 beoordelingen

5
3
4
1
3
2
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen