Authentication
Quiz by Rachel Hirsch
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
11 questions
Show answers
- Q1You manage a network that uses switches. In the lobby of your building, there are three Rj45 ports connected to a switch. You want to make sure that visitors cannot plug their computers into the free network jacks and connect to the network. But employees who plug into those same jacks should be able to connect to the network. What feature should you configure?VLANsmirroringport authentication using 802.1xspanning tree300s
- Q2Which of the following is a platform independent authentication system that maintains a database of user accounts and passwords that centralizes the maintenance of those accounts?RADIUSEAPRRASNAS300s
- Q3You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?run a third-party tool to generate the certificateobtain a certificate from a public PKIhave the server generate its own certificatecreate your own internal PKI to issue certificates300s
- Q4When using Kerberos authentication, which of the following terms is used to describe the token that verifies the user's identity to the target system?couponvoucherhashkeyTicket300s
- Q5You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client?MS-CHAPCHAPPPPEAP300s
- Q6Which of the following authentication method uses tickets to provide single sign-on?802.1xKerberosPKIMS-CHAP300s
- Q7Which of the following applications typically use 802.1x authentication?controlling access through a switch or wireless access pointcontrolling access through a firewallcontrolling access through an aclcontrolling access through a router or switch300s
- Q8Which of the following is the most common form of authentication?Photo IDDigital certificate on a smart cardfingerprintpassword300s
- Q9Which of the following is the strongest form of multi-factor authentication?a password and a biometric scana password, a biometric scan, and a token devicetwo-factor authenticationtwo passwords300s
- Q10Which of the following is an example of something you do?smart cardfingerprint scanhandwritingpassword300s
- Q11Which of the following systems encrypts the entire payload of communications?KerberosEAPTACACS+RADIUS300s