chpt8
TRANSCRIPT
Points Awarded 18.00
Points Missed 1.00
Percentage 94.7%
1. The management protocol of IEEE 802.1x that governs the interaction between the system, authenticator, and RADIUS server is known as the ____.
A) LDAP
B) TACACS+
C) X.500
D) EAP
Points Earned: 1.0/1.0
Correct Answer(s):
D
2. A ____ fingerprint scanner requires the user to place the entire thumb or finger on a small oval window on the scanner.
A) static
B) dynamic
C) cognitive
D) physical
Points Earned: 1.0/1.0
Correct Answer(s):
A
3. A ____ fingerprint scanner has a small slit or opening. Instead of placing the entire finger on the scanner the finger is swiped across the opening.
A) dynamic
B) physical
C) cognitive
D) static
Points Earned: 1.0/1.0
Correct Answer(s):
A
4. ____ refers to any combination of hardware and software that enables access to remote users to a local internal network.
A) LDAP
B) RAS
C) EAP
D) VPN
Points Earned: 1.0/1.0
Correct Answer(s):
B
5. ____ is an authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
A) TACACS+
B) Kerberos
C) LDAP
D) RADIUS
Points Earned: 1.0/1.0
Correct Answer(s):
B
6. Authorization is the process that determines whether the user has the authority to carry out certain tasks.
A) True
B) False
Points Earned: 1.0/1.0
Correct Answer(s):
True
7. Keystroke dynamics can be used to authenticate a user to a local desktop computer but not to a Web site.
A) True
B) False
Points Earned: 0.0/1.0
Correct Answer(s):
False
8. One example of cognitive biometrics requires the user to identify specific faces.
A) True
B) False
Points Earned: 1.0/1.0
Correct Answer(s):
True
9. Several large Internet providers support SSO, but only for their own suite of services and applications.
A) True
B) False
Points Earned: 1.0/1.0
Correct Answer(s):
True
10. OpenID is completely centralized.
A) True
B) False
Points Earned: 1.0/1.0
Correct Answer(s):
False
11. Match each item with a statement below:
A. Access control
B. Accounting
C. AAA servers
D. One-time passwords
E. Keystroke dynamics
F. Flight time
G. Phonetic cadence
H. One-factor
authentication
I. Single sign-on
the process by which resources or services are granted or denied
speaking two words together in a way that one word “bleeds” into the next word
servers dedicated to performing AAA functions
measures the resources a user “consumes” during each network session
using one authentication to access multiple accounts or applications
dynamic passwords that change frequently
using only one authentication credential
the time between keystrokes
attempt to recognize a user’s unique typing rhythmPoints Earned:
9.0/9.0
Correct Answer(s):
Access control:the process by which resources or services are granted or denied, Phonetic cadence:speaking two words together in a way that one word “bleeds” into the next word, AAA servers:servers dedicated to performing AAA functions, Accounting:measures the resources a user “consumes” during each network session, Single sign-on:using one authentication to access multiple accounts or applications, One-time passwords:dynamic passwords that change frequently, One-factor authentication:using only one authentication credential, Flight time:the time between keystrokes, Keystroke dynamics:attempt to recognize a user’s unique typing rhythm
A
G
C
B
I
D
H
F
E
Continue