Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CNIT 242 FINAL EXAM QUESTIONS AND ANSWERS 2025

Beoordeling
5.0
(1)
Verkocht
3
Pagina's
73
Cijfer
A+
Geüpload op
28-11-2025
Geschreven in
2025/2026

CNIT 242 FINAL EXAM QUESTIONS AND ANSWERS 2025

Instelling
CNIT 242
Vak
CNIT 242

Voorbeeld van de inhoud

CNIT 242 FINAL EXAM QUESTIONS AND ANSWERS 2025




What does AAA stand for? - (ANSWER)Authentication, Authorization, and Accounting



What question does Authentication answer? - (ANSWER)Do you have the credentials necessary to
access this system?



What question does Authorization answer? - (ANSWER)Once authenticated, what do you have
permission to do?



What question does Accounting answer? - (ANSWER)Once authorized to access a resource, how much of
the resource are you using?



Authentication can be accomplished using any of what 4 qualifications? - (ANSWER)What you know,
what you have, what you are, where you are



What is two-factor authentication? - (ANSWER)Using two of the 4 authentication qualifications to prove
an identity.



What 2 steps does the authentication process involve? - (ANSWER)Identification and proof of
identification



What are ways to provide identification? - (ANSWER)User ID, physical object (such as ATM card),
biometrics, digital certificates



What are ways to provide proof of identification? - (ANSWER)passwords, access codes, one-time tokens,
biometrics, digital certificates



What are strategic ways to develop user IDs? - (ANSWER)computer generated (NEVER simple names),
sometimes created to some algorithm, NEVER use the same as email address



True or False: UID / password combo can be a powerful method of authentication if properly managed -
(ANSWER)True

,CNIT 242 FINAL EXAM QUESTIONS AND ANSWERS 2025




What is the number one rule of password security? - (ANSWER)DON'T WRITE PASSWORDS DOWN



What is the security tradeoff with password? - (ANSWER)The more strict the password rules, the higher
the chances users will violate the first rule of secure passwords



What are biometrics? - (ANSWER)authentication. functions as both ID and proof of ID, separated into
physiological and behavioral



What are digital certificates? - (ANSWER)a form of authentication. encrypted data files that uses a
Certificate Authority to guarantee the identity of the holder



What does RADIUS stand for and what does it provide? - (ANSWER)Remote Access Dial-In User Service,
both Authentication and Authorization



What does TACAS+ stand for? - (ANSWER)Terminal Access Controller Access Control Service Plus



Where does authentication across the network exist? - (ANSWER)on the local computer by default, but
in an enterprise environment, it will be on a different server



In a domain environment, what is authenticated against? - (ANSWER)the domain, not the local machine



How is authorization accomplished? - (ANSWER)through rights and permissions



What level do group policies assign rights to? - (ANSWER)system



What level do access control lists assign permissions to? - (ANSWER)object



What is an access control list? - (ANSWER)simplest method of providing authorization, but requires a
separate authentication method. they are attached to/located on the resource

,CNIT 242 FINAL EXAM QUESTIONS AND ANSWERS 2025




What do ACLs contain? - (ANSWER)a list of authorized users and their authorization levels



When do "share" permissions apply? - (ANSWER)when the resource is accessed over a network



What 3 servers does Kerberos require? - (ANSWER)one authentication server, one ticket granting server,
and at least one application server



What is the basic concept of Kerberos? - (ANSWER)If a secret is known by only two people, either person
can verify the identity of the other by confirming that the other person knows the secret.



What is the purpose of a Kerberos Realm? - (ANSWER)admins create the realms which encompass all
that is available to access. a realm defines what Kerberos manages in terms of who can access what.



What is within a Kerberos Realm? - (ANSWER)Within the realm is the Client and the service/host
machine to which they requested access. There is also the Key Distribution Center which hold the
Authentication S and TGS



In Kerberos, when requesting access to a service or host, three interactions take place between you and:
- (ANSWER)the Authentication Server, the Ticket Granting Server, and the Service or host machine that
you're wanting access to



What will you receive with each interaction in Kerberos? - (ANSWER)Two messages. Each message is
one that you can decrypt, and one that you can not.



In Kerberos, does the service/machine you are requesting access to communicate directly with the KDC?
- (ANSWER)No, they do not!



Where are all the secret keys for user machines and services stored in Kerberos? - (ANSWER)the KDC



What are secret keys (in Kerberos)? - (ANSWER)passwords plus a salt that are hashed

, CNIT 242 FINAL EXAM QUESTIONS AND ANSWERS 2025




True or False: There are passwords on the services/host machines that use Kerberos. - (ANSWER)False



What happens during the set up of Kerberos? - (ANSWER)hash algorithm is chosen for secret keys,
admin choses a key for the service/host machine to memorize



What type of cryptography does Kerberos use? - (ANSWER)symmetric/private key, but can be
configured to use public key



How is the KDC protected? - (ANSWER)it itself is encrypted with a master key



What are traits of TACAS? - (ANSWER)Cisco-proprietary, TCP, AAA are separate processes



What are traits of RADIUS? - (ANSWER)Open standard, UDP, combines Authentication and
Authorization, only encrypts password



What are traits of Kerberos? - (ANSWER)Authentication only, no Authorization or Accounting



What standard does naming in AD follow? - (ANSWER)LDAP standard



What needs to be formed among domain trees (explicitly or implicitly) to build a domain forest? -
(ANSWER)trust relationships



Does creating AD groups as "Universal" maximize performance? - (ANSWER)no, it does not maximize



When is the Authoritative DNS server contacted? - (ANSWER)When the configured DNS server does not
have the record in its database/cache



Can users access their files when not connected to the network using Roaming User Profiles? -
(ANSWER)No, that's not what roaming profiles do

Geschreven voor

Instelling
CNIT 242
Vak
CNIT 242

Documentinformatie

Geüpload op
28 november 2025
Aantal pagina's
73
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$21.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
4 maanden geleden

5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Belaire Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2808
Lid sinds
1 jaar
Aantal volgers
2
Documenten
1352
Laatst verkocht
3 dagen geleden

5.0

505 beoordelingen

5
488
4
12
3
5
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen