Principles Of Computer Security CompTIA Security And Beyond 5th Edition By Conklin – Test Bank
Authentication and Remote Access
Multiple Choice Questions
- (p. 285)What protocol would you use for remote access, to get a console with an encrypted connection?
- (p. 285)What does SSH stand for?
A. Simple Security Hardware
B. Secure Socket Help
C. Secure Shell
D. Scientifically Secure Hard Drive
- (p. 286)The three major components of the SSH protocol are the
A. Transport Layer Protocol, User Authentication Protocol, and Connection Protocol
B. User Datagram Protocol, User Authentication Protocol, and Connection Protocol
C. Transport Layer Protocol, User Encryption Protocol, and Connection Protocol
D. User Datagram Protocol, User Encryption Protocol, and Connection Protocol
- (p. 265)What does AAA stand for?
A. Awareness, Accounting, Available
B. Acceptable, Available, Activities
C. Acute, Awareness, Accounting
D. Authentication, Authorization, Accounting
- (p. 282)Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network?
- (p. 275)Which of the following describes the wireless standard?
- (p. 275)What does RADIUS stand for?
A. Real Access Device Invisible Users Solution
B. Rational Available Device Incremental Users Service
C. Remote Authentication Dial-In User Service
D. Remote Authentication Device Invisible Users Solution
- (p. 278)What does TACACS stand for?
A. Terminal Access Control of Authentication and Control Systems
B. Terminal Access Controller Access Control System
C. Television Availability Control And Communication Standard
D. Teletype Authentication and Control of All Control Systems
- (p. 280)What are the three types of accounting records in TACACS+?
A. Availability, Accounting, Confidentiality
B. Availability, Integrity, Confidentiality
C. Start, Stop, Update
D. Start, Stop, Delete
- (p. 266)In addition to “What users know,” “What users have,” and “What users are,” what did the author add to be able to authenticate a user?
A. “What users should have”
B. “What users should think”
C. “What users can argue they should be”
D. “What users do”