TestOut 11.4.5 Practice Questions & Answers

which of the following are methods for providing centralized authentication

We thoroughly check each answer to a question to provide you with the most correct answers. Found a mistake? Let us know about it through the REPORT button at the bottom of the page.

Click to rate this post!
[Total: 1 Average: 5]
QuestionAnswer

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.)

 

– TACACS+

– 802.1x

– AAA

– PKI

– RADIUS

– EAP

TACACS+ and RADIUS are the correct answers.

You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization.

 

Which of the following is a required part of your configuration?

 

– Configure the remote access severs as RADIUS servers.

– Configure remote access clients as RADIUS clients.

– Configure the remote access servers as RADIUS clients.

– Obtain certificates from a public or private PKI.

Configure the remote access servers as RADIUS clients.

Which of the following are characteristics of TACACS+? (Select two.)

 

– Allows the possibility of two different servers, one for authentication and authorization, and another for accounting.

– Allows the possibility of three different servers, one for each authentication, authorization, and accounting.

– Uses TCP.

– Uses UDP.

– Allows the possibility of three different servers, one for each authentication, authorization, and accounting.
– Uses TCP.

Which of the following are difference between RADIUS and TACACS+?

 

– RADIUS combines authenticaiton and authorization into a single function; TACACS+ allows these services to be split between different servers.

– RADIUS uses TCP; TACACS+ uses UDP.

– RADIUS encrypts the entire packet contents; TACACS+ only encrypts the password.

– RADIUS supports more protocols than TACACS+

RADIUS combines authenticaiton and authorization into a single function; TACACS+ allows these services to be split between different servers.

Which of the following protocols can be used to centralize remote access authentication?

 

– EAP

– SESAME

– TACACS

– CHAP

– Kerberos

TACACS

RADIUS is primarily used for what purpose?

 

– Managing access to a network over a VPN.

– Managing RAID fault-tolerant drive configurations.

– Controlling entry gate access using proximity sensors.

– Authenticating remote clients before access to the network is granted.

Authenticating remote clients before access to the network is granted.

Which of the following is a characteristic of TACACS+?

 

– Requires that authentication and authorization are combined in a single server.

– Encrypts the entire packet, not just authentication packets.

– Uses UDP ports 1812 and 1813.

– Supports only TCP/IP.

Encrypts the entire packet, not just authentication packets.

Which of the following ports are used with TACACS?

 

– 22

– 49

– 50 and 51

– 1812 and 1813

– 3389

49

You are configuring your computer to dial up to the internet. What protocol should you use?

 

– PPTP

– PPP

– SMTP

– VPN

PPP

Which of the following protocols or services is commonly used on cable internet connections for user authentication?

 

– PPPoE

– PPP

– RDP

– RRAS

PPPoE

You have just signed up for internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home.

 

Which of the following protocols would be sued to provide authentication, authorization, and accounting for the internet connection?

 

– PPP

– L2TP

– ICA

– PPPoE

– RDP

PPPoE

You want to set up a service that allows multiple users to dial in to the office server from modems on their home computers. What service should you implement?

 

– RAS

– RIP

– ISDN

– PPP

RAS

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need.

 

You want the connection to be as secure as possible. Which type of connection will you need?

 

– Intranet

– Internet

– Remote access

– Virtual private network

Remote access

Which type of device is required to implement port authentication through a switch?

 

– Router

– Proxy server

– Layer 3 switch

– RADIUS server

RADIUS server

Was this helpful?