• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

_______________ is an authentication model designed around the concept of using tickets for accessing objects.

Kerberos

_______________ is designed around the type of tasks people perform.

Role-based access control (RBAC)

A formal manner of describing the necessary and sufficient portions of the IPsec protocol series to achieve a specific level of protection is a(n) _______________.

Security Association (SA)

_______________ describes a system where every resource has access rules set for it all of the time.

Mandatory access control (MAC)

A(n) _______________ is a collection of protocols used to secure network traffic over a nonsecure network.

Virtual Private Network (VPN)

In IPsec, a security association is defined by a specific combination of authentication header and _______________.

Encapsulating Security Payload

The protection of the data portion of a packet is _______________ protection.

Content

The protection of the header portion of a packet is _______________ protection.

Context

_______________ is a key management and exchange protocol used with IPsec.

ISAKMP

The process of comparing credentials to those established during the identification process is referred to as _______________.

Authentication

To establish a PPTP connection across a firewall, you must do which of the following?

Open TCP port 1723

On a VPN, traffic is encrypted and decrypted at:

Endpoints of the tunnel only

Secure Shell uses which port to communicate?

TCP port 22

Which of these protocols is used for carrying authentication, authorization, and accounting information between a network access server and a shared authentication server?

RADIUS

IPsec can provide which of the following types of protection?

Both context and content protection

Elements of Kerberos include which of the following?

Ticket-granting ticket, authentication server, ticket

What protocol is used for RADIUS?

UDP

Which protocols are natively supported by Microsoft Windows XP and Vista for use in securing remote connections? (more than one answer is allowed)

PPTP, IPsec

What are the foundational elements of an access control system?

Identification, authorization, authentication

A ticket-granting server is an important element in which of the following authentication models?

Kerberos

Authentication is typically based upon what?

A) Something a user possesses
B) Something a user knows
C) Something measured on a user, such as a fingerprint

Passwords are an example of

Something you know

IPsec provides which options as security services?


ESP and AH

To establish an L2TP connection across a firewall, you must do which of the following?

Open UDP port 1701

Which statement best describes differences between RADIUS and TACACS+?

TACACS+ separates authentication, authorization, and accounting capabilities