Test Your Knowledge of Military Classification Schemes and Information Sensitivi...
50 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which authentication method is commonly used on UNIX devices?

  • TACACS+ (correct)
  • LDAP
  • Kerberos
  • RADIUS
  • Which access control model is typically found in military settings?

  • Rule Based Access Control (RBAC)
  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC) (correct)
  • Role Based Access Control (RBAC)
  • Which authentication method uses encryption and authentication for security?

  • TACACS+
  • RADIUS
  • Kerberos (correct)
  • LDAP
  • Which authentication method requires authentication whenever a client system attempts connection?

    <p>Session authentication</p> Signup and view all the answers

    Which of the following is NOT a component part of virtual private networks (VPNs)?

    <p>Identification</p> Signup and view all the answers

    What is the purpose of access control in network security?

    <p>To grant or deny approval to use specific resources</p> Signup and view all the answers

    Which of the following is an example of something you know in the context of authentication?

    <p>Password</p> Signup and view all the answers

    What is a common weakness of passwords?

    <p>Users often take shortcuts in creating them</p> Signup and view all the answers

    Which type of VPN allows remote users to access a network through dial-in access?

    <p>Client-to-site VPN</p> Signup and view all the answers

    What is the purpose of IP encapsulation in VPNs?

    <p>To hide the actual IPs</p> Signup and view all the answers

    Which tunneling protocol is used for connection using dial-in modem?

    <p>Point-to-point tunneling protocol (PPTP)</p> Signup and view all the answers

    In a mesh configuration VPN, what is the relationship called between each participant?

    <p>Security association (SA)</p> Signup and view all the answers

    Which of the following is NOT a form of access control mentioned in the text?

    <p>Rule Based Access Control</p> Signup and view all the answers

    What is the purpose of a Virtual Private Network (VPN)?

    <p>To create a secure, private network over a public network</p> Signup and view all the answers

    Which of the following is a best practice for access control mentioned in the text?

    <p>Least privilege</p> Signup and view all the answers

    What is the highest level of military classification mentioned in the text?

    <p>Top Secret</p> Signup and view all the answers

    Which layer does VPN over SSL work at?

    <p>Layer 5/6</p> Signup and view all the answers

    What is the purpose of a TUN/TAP interface in VPNs?

    <p>To interact with the kernel and deliver IP packets to user space programs</p> Signup and view all the answers

    What is the main advantage of using Tor for anonymity?

    <p>It provides random relays to serve requests for communications</p> Signup and view all the answers

    What problem does Tor solve in terms of anonymity?

    <p>It hides the address but not the content of communications</p> Signup and view all the answers

    Which type of VPN allows remote users to access a network through dial-in access?

    <p>Client-to-site VPN</p> Signup and view all the answers

    What is the purpose of IP encapsulation in VPNs?

    <p>To hide actual IPs</p> Signup and view all the answers

    Which tunneling protocol is used for connection using dial-in modem?

    <p>Point-to-point tunneling protocol (PPTP)</p> Signup and view all the answers

    Which layer does VPN over SSL work at?

    <p>Network layer</p> Signup and view all the answers

    What is the main advantage of using Tor for anonymity?

    <p>Multi-hop routing</p> Signup and view all the answers

    Which authentication method requires authentication whenever a client system attempts connection?

    <p>Tokens</p> Signup and view all the answers

    Which layer does VPN over IPSec work at?

    <p>Layer 3</p> Signup and view all the answers

    Which type of VPN provides more granular control over access permissions to specific services?

    <p>VPN over SSL</p> Signup and view all the answers

    What is the purpose of the TUN/TAP interface in VPNs?

    <p>To interact with the kernel</p> Signup and view all the answers

    What is the main advantage of using Tor for anonymity?

    <p>Random relays for serving requests</p> Signup and view all the answers

    What is the purpose of IP encapsulation in VPNs?

    <p>To forward data</p> Signup and view all the answers

    Which authentication method is commonly used on UNIX devices?

    <p>PPP</p> Signup and view all the answers

    Which of the following authentication methods is suitable for high volume service control applications, such as dial-in access to a corporate network?

    <p>RADIUS</p> Signup and view all the answers

    Which authentication method uses a central server to maintain all user authorizations and is also called authentication, authorization, and auditing (AAA) server?

    <p>TACACS+</p> Signup and view all the answers

    Which authentication method uses encryption and authentication for security, and is most often used in educational and government settings?

    <p>Kerberos</p> Signup and view all the answers

    Which authentication method originated at the University of Michigan and builds a tree directory containing information about users and network devices?

    <p>LDAP</p> Signup and view all the answers

    Which access control model is typically found in military settings and enforces controls by the computer system without intervention from the data owner?

    <p>Mandatory Access Control (MAC)</p> Signup and view all the answers

    Which access control model grants permissions based on comparing object and subject labels, where the subject must have equal or greater level than the object to be granted access?

    <p>Mandatory Access Control (MAC)</p> Signup and view all the answers

    Which of the following is an example of a strong authentication method?

    <p>Using a fingerprint scan</p> Signup and view all the answers

    What is the purpose of periodic reviews in the context of authentication?

    <p>To determine if employees still require an account</p> Signup and view all the answers

    Which of the following is NOT a weakness of passwords?

    <p>Passwords must be changed frequently</p> Signup and view all the answers

    What is the purpose of a salt in password hashing?

    <p>To add randomness to the password hashing process</p> Signup and view all the answers

    Which of the following is a best practice for password policies?

    <p>Changing passwords every 90 days</p> Signup and view all the answers

    What is the purpose of access control in network security?

    <p>To regulate admission into trusted areas of the organization</p> Signup and view all the answers

    Which of the following is NOT a weakness of Discretionary Access Control (DAC)?

    <p>DAC is implemented at the discretion of the data owner</p> Signup and view all the answers

    Which access control model assigns permissions based on a user's job function?

    <p>Role Based Access Control (RBAC)</p> Signup and view all the answers

    Which of the following is NOT a best practice for access control?

    <p>Job rotation</p> Signup and view all the answers

    What is the purpose of a Virtual Private Network (VPN)?

    <p>To create a secure, private network over a public network</p> Signup and view all the answers

    What is the relationship called between each participant in a mesh configuration VPN?

    <p>Peer-to-peer</p> Signup and view all the answers

    Which layer does VPN over SSL work at?

    <p>Transport layer</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser