Ready to test your Knowledge?
Try out our new practice tests completely free!
exam preparation banner icon

Guide to Network Security

Computing

Quiz 5 :

Network Authentication and Remote Access Using Vpn

Quiz 5 :

Network Authentication and Remote Access Using Vpn

search
arrow
A ____ is an automatic phone-dialing program that dials every phone number in a configured range and checks to see if a person, answering machine, or modem answers.
Free
Multiple Choice
Answer:

Answer:

D

Tags
Choose question tag
close menu
arrow
The growth and widespread use of the Internet has been coupled with the use of encryption technology to produce a solution for specific types of private communication channels: ____.
Free
Multiple Choice
Answer:

Answer:

B

Tags
Choose question tag
close menu
arrow
Which centralized authentication method uses UDP?
Free
Multiple Choice
Answer:

Answer:

B

Tags
Choose question tag
close menu
arrow
Biometrics (retinal scans, fingerprints, and the like) are mainly used for ____ by large security-minded entities such as banking institutions and credit card centers for regulating access to sensitive information, but biometrics are also gaining ground in the general corporate world.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A bank's automated teller machine (ATM), which restricts authorized users to simple account queries, transfers, deposits, and withdrawals is an example of ____ access control.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A ____ is one in which the computer system enforces the controls without the input or intervention of the system or data owner.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Client authentication is similar to user authentication but with the addition of ____.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which access control principle is most frequently associated with data classification?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which level in the U.S. military data classification scheme applies to any information or material the unauthorized disclosure of which reasonably could be expected to cause damage to the national security?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which access control principle restricts users to having access appropriate to the level required for their assigned duties?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which centralized authentication method is the latest and strongest version of a set of authentication protocols developed by Cisco Systems?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which access control process documents the activities of the authenticated individual and systems?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Most personal computer operating systems use the mandatory access control (MAC) model.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application and what can they do with it.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Separation of duties reduces the chance of an individual violating information security policy and breaching the confidentiality, integrity, and availability of information.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A ____ attack is time-intensive, so they are rarely aimed at the target system in general.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
PPTP provides stronger protection than L2TP.
True False
Answer:
Tags
Choose question tag
close menu
arrow
In order to implement MAC, a strict user and data classification scheme is required.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Which authentication method is used when you want a client to be authenticated for each session?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Today, the widespread acceptance of IPSec with the IKE system means that proprietary protocols are used far more often.
True False
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 50