Podcast
Questions and Answers
Which authentication method is commonly used on UNIX devices?
Which authentication method is commonly used on UNIX devices?
- TACACS+ (correct)
- LDAP
- Kerberos
- RADIUS
Which access control model is typically found in military settings?
Which access control model is typically found in military settings?
- Rule Based Access Control (RBAC)
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC) (correct)
- Role Based Access Control (RBAC)
Which authentication method uses encryption and authentication for security?
Which authentication method uses encryption and authentication for security?
- TACACS+
- RADIUS
- Kerberos (correct)
- LDAP
Which authentication method requires authentication whenever a client system attempts connection?
Which authentication method requires authentication whenever a client system attempts connection?
Which of the following is NOT a component part of virtual private networks (VPNs)?
Which of the following is NOT a component part of virtual private networks (VPNs)?
What is the purpose of access control in network security?
What is the purpose of access control in network security?
Which of the following is an example of something you know in the context of authentication?
Which of the following is an example of something you know in the context of authentication?
What is a common weakness of passwords?
What is a common weakness of passwords?
Which type of VPN allows remote users to access a network through dial-in access?
Which type of VPN allows remote users to access a network through dial-in access?
What is the purpose of IP encapsulation in VPNs?
What is the purpose of IP encapsulation in VPNs?
Which tunneling protocol is used for connection using dial-in modem?
Which tunneling protocol is used for connection using dial-in modem?
In a mesh configuration VPN, what is the relationship called between each participant?
In a mesh configuration VPN, what is the relationship called between each participant?
Which of the following is NOT a form of access control mentioned in the text?
Which of the following is NOT a form of access control mentioned in the text?
What is the purpose of a Virtual Private Network (VPN)?
What is the purpose of a Virtual Private Network (VPN)?
Which of the following is a best practice for access control mentioned in the text?
Which of the following is a best practice for access control mentioned in the text?
What is the highest level of military classification mentioned in the text?
What is the highest level of military classification mentioned in the text?
Which layer does VPN over SSL work at?
Which layer does VPN over SSL work at?
What is the purpose of a TUN/TAP interface in VPNs?
What is the purpose of a TUN/TAP interface in VPNs?
What is the main advantage of using Tor for anonymity?
What is the main advantage of using Tor for anonymity?
What problem does Tor solve in terms of anonymity?
What problem does Tor solve in terms of anonymity?
Which type of VPN allows remote users to access a network through dial-in access?
Which type of VPN allows remote users to access a network through dial-in access?
What is the purpose of IP encapsulation in VPNs?
What is the purpose of IP encapsulation in VPNs?
Which tunneling protocol is used for connection using dial-in modem?
Which tunneling protocol is used for connection using dial-in modem?
Which layer does VPN over SSL work at?
Which layer does VPN over SSL work at?
What is the main advantage of using Tor for anonymity?
What is the main advantage of using Tor for anonymity?
Which authentication method requires authentication whenever a client system attempts connection?
Which authentication method requires authentication whenever a client system attempts connection?
Which layer does VPN over IPSec work at?
Which layer does VPN over IPSec work at?
Which type of VPN provides more granular control over access permissions to specific services?
Which type of VPN provides more granular control over access permissions to specific services?
What is the purpose of the TUN/TAP interface in VPNs?
What is the purpose of the TUN/TAP interface in VPNs?
What is the main advantage of using Tor for anonymity?
What is the main advantage of using Tor for anonymity?
What is the purpose of IP encapsulation in VPNs?
What is the purpose of IP encapsulation in VPNs?
Which authentication method is commonly used on UNIX devices?
Which authentication method is commonly used on UNIX devices?
Which of the following authentication methods is suitable for high volume service control applications, such as dial-in access to a corporate network?
Which of the following authentication methods is suitable for high volume service control applications, such as dial-in access to a corporate network?
Which authentication method uses a central server to maintain all user authorizations and is also called authentication, authorization, and auditing (AAA) server?
Which authentication method uses a central server to maintain all user authorizations and is also called authentication, authorization, and auditing (AAA) server?
Which authentication method uses encryption and authentication for security, and is most often used in educational and government settings?
Which authentication method uses encryption and authentication for security, and is most often used in educational and government settings?
Which authentication method originated at the University of Michigan and builds a tree directory containing information about users and network devices?
Which authentication method originated at the University of Michigan and builds a tree directory containing information about users and network devices?
Which access control model is typically found in military settings and enforces controls by the computer system without intervention from the data owner?
Which access control model is typically found in military settings and enforces controls by the computer system without intervention from the data owner?
Which access control model grants permissions based on comparing object and subject labels, where the subject must have equal or greater level than the object to be granted access?
Which access control model grants permissions based on comparing object and subject labels, where the subject must have equal or greater level than the object to be granted access?
Which of the following is an example of a strong authentication method?
Which of the following is an example of a strong authentication method?
What is the purpose of periodic reviews in the context of authentication?
What is the purpose of periodic reviews in the context of authentication?
Which of the following is NOT a weakness of passwords?
Which of the following is NOT a weakness of passwords?
What is the purpose of a salt in password hashing?
What is the purpose of a salt in password hashing?
Which of the following is a best practice for password policies?
Which of the following is a best practice for password policies?
What is the purpose of access control in network security?
What is the purpose of access control in network security?
Which of the following is NOT a weakness of Discretionary Access Control (DAC)?
Which of the following is NOT a weakness of Discretionary Access Control (DAC)?
Which access control model assigns permissions based on a user's job function?
Which access control model assigns permissions based on a user's job function?
Which of the following is NOT a best practice for access control?
Which of the following is NOT a best practice for access control?
What is the purpose of a Virtual Private Network (VPN)?
What is the purpose of a Virtual Private Network (VPN)?
What is the relationship called between each participant in a mesh configuration VPN?
What is the relationship called between each participant in a mesh configuration VPN?
Which layer does VPN over SSL work at?
Which layer does VPN over SSL work at?