I Hate CBT's

View Original

TestOut 11.4.5 Practice Questions & Answers

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.)


– TACACS+


– 802.1x


– AAA


– PKI


– RADIUS


– EAP


Answer: TACACS+ and RADIUS


You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization.


 


Which of the following is a required part of your configuration?


 


– Configure the remote access severs as RADIUS servers.


– Configure remote access clients as RADIUS clients.


– Configure the remote access servers as RADIUS clients.


– Obtain certificates from a public or private PKI.


Answer: Configure the remote access servers as RADIUS clients.







Which of the following are characteristics of TACACS+? (Select two.)


– Allows the possibility of two different servers, one for authentication and authorization, and another for accounting.


– Allows the possibility of three different servers, one for each authentication, authorization, and accounting.


– Uses TCP.


– Uses UDP.


Answer: – Allows the possibility of three different servers, one for each authentication, authorization, and accounting.

– Uses TCP.



Which of the following are difference between RADIUS and TACACS+?


 – RADIUS combines authenticaiton and authorization into a single function; TACACS+ allows these services to be split between different servers.


– RADIUS uses TCP; TACACS+ uses UDP.


– RADIUS encrypts the entire packet contents; TACACS+ only encrypts the password.


– RADIUS supports more protocols than TACACS+


Answer: RADIUS combines authenticaiton and authorization into a single function; TACACS+ allows these services to be split between different servers.


Which of the following protocols can be used to centralize remote access authentication?


– EAP


– SESAME


– TACACS


– CHAP


– Kerberos


Answer: TACACS


RADIUS is primarily used for what purpose?


– Managing access to a network over a VPN.


– Managing RAID fault-tolerant drive configurations.


– Controlling entry gate access using proximity sensors.


– Authenticating remote clients before access to the network is granted.


Answer: Authenticating remote clients before access to the network is granted.



Which of the following is a characteristic of TACACS+?


– Requires that authentication and authorization are combined in a single server.


– Encrypts the entire packet, not just authentication packets.


– Uses UDP ports 1812 and 1813.


– Supports only TCP/IP.


Answer: Encrypts the entire packet, not just authentication packets.



Which of the following ports are used with TACACS?


– 22


– 49


– 50 and 51


– 1812 and 1813


– 3389


Answer: 49




You are configuring your computer to dial up to the internet. What protocol should you use?


– PPTP


– PPP


– SMTP


– VPN


Answer: PPP




Which of the following protocols or services is commonly used on cable internet connections for user authentication?


– PPPoE


– PPP


– RDP


– RRAS



Answer: PPPoE



You have just signed up for internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home.

Which of the following protocols would be sued to provide authentication, authorization, and accounting for the internet connection?


 


– PPP


– L2TP


– ICA


– PPPoE


– RDP


Answer: PPPoE



You want to set up a service that allows multiple users to dial in to the office server from modems on their home computers. What service should you implement?


– RAS


– RIP


– ISDN


– PPP


Answer: RAS




You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need.

You want the connection to be as secure as possible. Which type of connection will you need?


– Intranet


– Internet


– Remote access


– Virtual private network



Answer: Remote access







Which type of device is required to implement port authentication through a switch?


– Router


– Proxy server


– Layer 3 switch


– RADIUS server


Answer: RADIUS server