Information Technology > QUESTIONS & ANSWERS > IT Security: Defense against the digital dark arts Questions and Answers Rated A (All)
IT Security: Defense against the digital dark arts Questions and Answers Rated A Authn is short for ________. ✔✔Authentication. Authz (Authorization) Authorization is concerned with determinin... g ______ to resources. ✔✔access. Authorization deals with determining access to resources In addition to the client being authenticated by the server, certificate authentication also provides ______. ✔✔Server authentication. The client will validate the server's certificate, thereby providing server authentication and client authentication. Kerberos uses _____ as authentication tokens. ✔✔Tickets. Kerberos issues tickets, which represent authentication and authorization tokens Your bank set up multifactor authentication to access your account online. You know your password. What other factor combined with your password qualifies for multifactor authentication? Check all that apply. ✔✔Fingerprint Bank Card A Lightweight Directory Access Protocol (LDAP) uses a _____ structure to hold directory objects. ✔✔Data Information Tree. A Lightweight Directory Access Protocol (LDAP) uses a Data Information Tree structure to hold directory objects. What is used to request access to services in the Kerberos process? ✔✔TGT Multiple client switches and routers have been set up at a small military base. The network team decided to implement Terminal Access Controller Access-Control System Plus (TACACS+), along with Kerberos, and an external Lightweight Directory Access Protocol (LDAP) service. What is the primary reason TACACS+ was chosen for this? ✔✔Device Administration. TACACS+ is primarily used for device administration authentication, authorization, and accounting (AAA). In the three As of security, which part pertains to describing what the user account does or doesn't have access to? ✔✔Authentication Accessibility Accounting Authorization (NO) Authorization pertains to describing what the user account does or doesn't have access to. A(n) _____ defines permissions or authorizations for objects. ✔✔Access Control List. An Access Control List (ACL) defines permissions or authorizations for objects. Access control entries can be created for what types of file system objects? Check all that apply. ✔✔Folders Files Programs Authentication is concerned with determining _______. ✔✔Identity [Show More]
Last updated: 1 year ago
Preview 1 out of 5 pages
Instant download
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
Connected school, study & course
About the document
Uploaded On
Oct 03, 2022
Number of pages
5
Written in
This document has been written for:
Uploaded
Oct 03, 2022
Downloads
0
Views
92
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·