multi-factor authentication factors
Try again once you are ready
Grade received 70%
Latest Submission Grade 70%
To pass 80% or higher
Try again
1.
Question 1
Fill in the blank: _____ is the idea of describing an entity uniquely.
point
Identification
Eligibility
Authorization
Validity
Correct
2.
Question 2
In the three A’s of security (AAA), what is the process of proving who you claim to be?
point
Authored
Accounting
Authentication
Authorization
Correct
3.
Question 3
Fill in the blank: Security Keys utilize a secure challenge-and-response authentication
system, which is based on _____.
point
shared secrets
steganography
symmetric encryption
public key cryptography
,Correct
4.
Question 4
Which of the following are examples of "something you have" for multifactor
authentication? Select all that apply.
0. point
RSA SecureID token
Correct
PING
This should not be selected
Please review the video on multifactor authentication for a refresher.
Password
This should not be selected
Please review the video on multifactor authentication for a refresher.
One-Time-Password (OTP)
Correct
5.
Question 5
If an organization want to issue and sign client certificates, what will it need to set up?
point
An ID infrastructure
A CRL infrastructure
A CA infrastructure
An LDAP infrastructure
Correct
6.
Question 6
What type of structure does Lightweight Directory Access Protocol (LDAP) use to hold
directory objects?
point
Data information tree
Organizational unit
Bind
Distinguished name
,Correct
7.
Question 7
What is used to request access to services in the Kerberos
process?
point
TGS session key
Client ID
*A: Ticket Granting Ticket
Client-to-Server ticket
Incorrect
Please review the video about Kerberos for a refresher.
8.
Question 8
Consider the following scenario: A network admin wants to use a Remote Authentication
Dial-In User Service (RADIUS) protocol to allow 5 user accounts to connect company
laptops to an access point in the office. These are generic users and will not be updated
often. Which of these internal sources would be appropriate to store these accounts in?
point
Active Directory
Flat file
SQL database
LDAP
Incorrect
Please review the video about RADIUS for a refresher.
9.
Question 9
Which of these are examples of an access control system? Select all that apply.
0. point
RADIUS
Correct
OpenID
This should not be selected
Please review the video on access control for a refresher.
TACACS+
Correct
, OAuth
Correct
10.
Question 10
What does a Terminal Access Controller Access Control System Plus (TACACS+) keep
track of? Select all that apply.
0. point
Systems users authenticated to
Correct
Commands that were run
Correct
Track user authentication
Correct
Bandwidth and resource usage
This should not be selected
Please review the video about tracking usage and access for a refresher.
Try again once you are ready
Grade received 70%
Latest Submission Grade 47.50%
To pass 80% or higher
Try again
1.
Question 1
Fill in the blank: In the world of AAA security, “authn” is short for _____.
point
authoritarian
authorization
authentication
authored
Correct
2.