Menu

  • Networking Funda | Your Ultimate Guide to Online Learning Success

Categories

  • No categories

Follow Us

networkingfunda.com
  • Browse
  • Features
    • Global Player
    • Podcast Category
    • Podcast List
    • Episode List
    • Single Episode
    • More Podcast Features …
No Result
View All Result
Subscribe
  • Login
networkingfunda.com
No Result
View All Result

Module 03 Challenge Authentication Authorization & Accounting Quiz Answers

Get IT Security: Defense Against The Digital Dark Arts Graded Quiz Answers

  • Get IT Security: Defense Against The Digital Dark Arts Graded Quiz Answers
    • Q1. Fill in the blank: In the world of AAA security, “authn” is short for _____.
    • Q2. Fill in the blank: Authorization is concerned with determining _____ to resources.
    • Q3. Fill in the blank: Security Keys utilize a secure challenge-and-response authentication system, which is based on _____.
    • Q4. Which of the following are examples of “something you have” for multifactor authentication? Select all that apply.
    • Q5. What is a client certificate used for?
    • Q6. How might a user protect the data on their mobile device if it is lost or stolen?
    • Q7. Fill in the blank: The authentication server is to authentication as the ticket granting service is to _____.
    • Q8. Consider the following scenario: A network admin wants to use a Remote Authentication Dial-In User Service (RADIUS) protocol to allow 5 user accounts to connect company laptops to an access point in the office. These are generic users and will not be updated often. Which of these internal sources would be appropriate to store these accounts in?
    • Q9. Consider the following scenario: A network admin deployed a Terminal Access Controller Access Control System Plus (TACACS+) system so other admins can properly manage multiple switches and routers on the Local Area Network (LAN). The system will keep track and log admin access to each device and the changes made. This “logging” satisfies which part of the three A’s of security?
    • Q10: Access control entries can be created for what types of file system objects? Select all that apply.
Q1. Fill in the blank: In the world of AAA security, “authn” is short for _____.

Answer: authentication

Explanation: In AAA security (Authentication, Authorization, and Accounting), “authn” refers to authentication, the process of verifying a user’s identity.


Q2. Fill in the blank: Authorization is concerned with determining _____ to resources.

Answer: access

Explanation: Authorization is the process of determining what actions or resources a user is allowed to access after their identity has been authenticated.


Q3. Fill in the blank: Security Keys utilize a secure challenge-and-response authentication system, which is based on _____.

Answer: public key cryptography

Explanation: Security keys use public key cryptography to perform a challenge-response authentication, ensuring secure and tamper-resistant verification.


Q4. Which of the following are examples of “something you have” for multifactor authentication? Select all that apply.

Answer:

  • One-Time-Password (OTP)
  • RSA SecureID token
    Explanation:
    “Something you have” refers to physical or digital items such as OTP generators or secure tokens used as a second authentication factor. PING and passwords fall into other categories.

Q5. What is a client certificate used for?

Answer: To authenticate the client

Explanation: A client certificate is used in mutual TLS to verify the identity of a client during a secure connection.


Q6. How might a user protect the data on their mobile device if it is lost or stolen?

Answer: Remote wipes

Explanation: Remote wiping allows users to erase all data from their device remotely, protecting sensitive information if the device is lost or stolen.


Q7. Fill in the blank: The authentication server is to authentication as the ticket granting service is to _____.

Answer: authorization

Explanation: In systems like Kerberos, the Ticket Granting Service (TGS) issues tickets that allow access to resources, which is part of the authorization process.


Q8. Consider the following scenario: A network admin wants to use a Remote Authentication Dial-In User Service (RADIUS) protocol to allow 5 user accounts to connect company laptops to an access point in the office. These are generic users and will not be updated often. Which of these internal sources would be appropriate to store these accounts in?

Answer: Flat file

Explanation: For a small and static set of users, a flat file is a simple and efficient option to store user accounts, especially when updates are infrequent.


Q9. Consider the following scenario: A network admin deployed a Terminal Access Controller Access Control System Plus (TACACS+) system so other admins can properly manage multiple switches and routers on the Local Area Network (LAN). The system will keep track and log admin access to each device and the changes made. This “logging” satisfies which part of the three A’s of security?

Answer: Accounting

Explanation: Accounting refers to the tracking and logging of user activities, such as access and changes made to devices or systems.


Q10: Access control entries can be created for what types of file system objects? Select all that apply.

Answer:

  • Files
  • Folders
  • Programs
    Explanation:
    Access control entries (ACEs) can define permissions for files, folders, and programs, determining which users or groups have access to them. APIs are not file system objects
Get IT Security: Defense Against The Digital Dark Arts Practice Quiz Answers >>

Module 01 Challenge: Understanding Security Threats Quiz Answers

Module 02 Challenge: Pelcgbybtl (Cryptology) Graded Quiz Answers

Module 03 Challenge Authentication Authorization & Accounting Quiz Answers

Module 04 Challenge: Securing Your Networks Quiz Answers

Module 05 Challenge: Defense in Depth Quiz Answers

Module 06 Challenge: Creating a Company Culture for Security Quiz Answers

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Copyright © 2021 by Jegtheme.

  • About
  • Buy JNews
  • Request A Demo
  • Contact

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Purchase JNews
  • Pre-sale Question
  • Support Forum
  • Back to Landing Page

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.