chpt8

4
Points Awarded 18.00 Points Missed 1.00 Percentage 94.7% 1. The management protocol of IEEE 802.1x that governs the interaction between the system, authenticator, and RADIUS server is known as the ____. A) LDAP B) TACACS+ C) X.500 D) EAP Points Earned: 1.0/1 .0 Correct Answer(s): D 2. A ____ fingerprint scanner requires the user to place the entire thumb or finger on a small oval window on the scanner. A) static B) dynamic C) cognitive D) physical Points Earned: 1.0/1 .0 Correct Answer(s): A 3. A ____ fingerprint scanner has a small slit or opening. Instead of placing the entire finger on the scanner the finger is swiped across the opening. A) dynamic B) physical C) cognitive D) static Points Earned: 1.0/1

Upload: carl-jones

Post on 06-Apr-2015

1.197 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: chpt8

Points Awarded 18.00

Points Missed 1.00

Percentage 94.7%

1. The management protocol of IEEE 802.1x that governs the interaction between the system, authenticator, and RADIUS server is known as the ____.

A) LDAP

B) TACACS+

C) X.500

D) EAP

Points Earned: 1.0/1.0

Correct Answer(s):

D

2. A ____ fingerprint scanner requires the user to place the entire thumb or finger on a small oval window on the scanner.

A) static

B) dynamic

C) cognitive

D) physical

Points Earned: 1.0/1.0

Correct Answer(s):

A

3. A ____ fingerprint scanner has a small slit or opening. Instead of placing the entire finger on the scanner the finger is swiped across the opening.

A) dynamic

B) physical

C) cognitive

D) static

Points Earned: 1.0/1.0

Correct Answer(s):

A

Page 2: chpt8

4. ____ refers to any combination of hardware and software that enables access to remote users to a local internal network.

A) LDAP

B) RAS

C) EAP

D) VPN

Points Earned: 1.0/1.0

Correct Answer(s):

B

5. ____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.

A) TACACS+

B) Kerberos

C) LDAP

D) RADIUS

Points Earned: 1.0/1.0

Correct Answer(s):

B

6. Authorization is the process that determines whether the user has the authority to carry out certain tasks.

A) True

B) False

Points Earned: 1.0/1.0

Correct Answer(s):

True

7. Keystroke dynamics can be used to authenticate a user to a local desktop computer but not to a Web site.

A) True

B) False

Points Earned: 0.0/1.0

Page 3: chpt8

Correct Answer(s):

False

8. One example of cognitive biometrics requires the user to identify specific faces.

A) True

B) False

Points Earned: 1.0/1.0

Correct Answer(s):

True

9. Several large Internet providers support SSO, but only for their own suite of services and applications.

A) True

B) False

Points Earned: 1.0/1.0

Correct Answer(s):

True

10. OpenID is completely centralized.

A) True

B) False

Points Earned: 1.0/1.0

Correct Answer(s):

False

11. Match each item with a statement below:

A. Access control

B. Accounting

C. AAA servers

D. One-time passwords

E. Keystroke dynamics

F. Flight time

G. Phonetic cadence

H. One-factor

Page 4: chpt8

authentication

I. Single sign-on

the process by which resources or services are granted or denied

speaking two words together in a way that one word “bleeds” into the next word

servers dedicated to performing AAA functions

measures the resources a user “consumes” during each network session

using one authentication to access multiple accounts or applications

dynamic passwords that change frequently

using only one authentication credential

the time between keystrokes

attempt to recognize a user’s unique typing rhythmPoints Earned:

9.0/9.0

Correct Answer(s):

Access control:the process by which resources or services are granted or denied, Phonetic cadence:speaking two words together in a way that one word “bleeds” into the next word, AAA servers:servers dedicated to performing AAA functions, Accounting:measures the resources a user “consumes” during each network session, Single sign-on:using one authentication to access multiple accounts or applications, One-time passwords:dynamic passwords that change frequently, One-factor authentication:using only one authentication credential, Flight time:the time between keystrokes, Keystroke dynamics:attempt to recognize a user’s unique typing rhythm

A

G

C

B

I

D

H

F

E

Continue