This IEEE quiz evaluates knowledge on network security protocols and standards, including RADIUS, LDAP, and IEEE 802.1x. It tests understanding of AAA elements, Kerberos authentication, and the identification process in access control, essential for professionals in IT security.
Use a short password so the computer can process it more quickly
Avoid using phonetic words
Do not use sequences
Do not use personal information
Rate this question:
Speed
Size
Cost
Standards
Rate this question:
RDAP
DAP
RADIUS
AAA
Rate this question:
What you have
What you are
What you discover
What you know
Rate this question:
Stream
Hash
Algorithm
Key
Rate this question:
Key_hash
WEP
MDRIPE
Hashed Message Authentication Code (HMAC)
Rate this question:
Confidentiality
Stop loss
Integrity
Authenticity
Rate this question:
Credentialization
Identification authentication
Single sign-on
Federal login
Rate this question:
Enterprise Security
Least privilege
Deny all
Mandatory Limitations
Rate this question:
Orphaned
Limbo
Static
Dormant
Rate this question:
Resource
Cognitive
Adaptive
Behavioral
Rate this question:
MEC-2
RSA
MD-17
SHA-2
Rate this question:
It could decrease calls to the help desk.
Because the network administrator would then have to manually reset the account.
So the user would not have to wait too long to have their password reset.
It could result in denial of service (DoS) attacks.
Rate this question:
Access control list (ACL)
Subject Access Entity (SAE)
Object modifier
Security entry designator
Rate this question:
EFS
Quantum computing
ECC
RSA
Rate this question:
SQL/LDAP insert attack
Modified Trojan attack
LDAP injection attack
RBASE plug-in attack
Rate this question:
A lengthy and complex password can be difficult to memorize.
A security policy requires a password to be changed regularly.
Having multiple passwords makes it hard to remember all of them.
Most sites force users to create weak passwords although they do not want to.
Rate this question:
Standard
Intelligent
Behavioral
Cognitive
Rate this question:
Computer footprinting
OpenAuthorization
Cognitive biometrics
Internet Throttling
Rate this question:
Allows the user to boot a corrupted disk and repair it
Is only available on Windows computers running BitLocker
Includes a pseudorandom number generator (PRNG)
Provides cryptographic services in hardware instead of software
Rate this question:
Controlling access to network resources (authentication)
Enforcing security policies (authorization)
Determining user need (analyzing)
Auditing usage (accounting)
Rate this question:
Denial of duties
Implicit deny
Explicit rejection
Prevention control
Rate this question:
Prove the integrity of the message
Verify the receiver
Verify the sender
Enforce non-repudiation
Rate this question:
Is weaker than NTLMv2
Is part of BitLocker
Is required to be present when using TPM
Is identical to MD-4
Rate this question:
Role Based Access Control (RBAC)
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Rule Based Access Control (RBAC)
Rate this question:
Supervisor
Owner
Custodian
Manager
Rate this question:
For as long as it appears on the device
For up to 1 hour
Only for the user who possesses the device
If it is longer than 8 characters
Rate this question:
Time-Location Resource Monitoring (TLRM)
Keystroke dynamics
Cognitive biometrics
Computer footprinting
Rate this question:
Authenticity
Confidentiality
Integrity
Availability
Rate this question:
Is considered obsolete today
Dynamically assigns roles to subjects based on rules
Is considered a real-world approach by linking a user’s job function with security
Requires that a custodian set all rules
Rate this question:
Processes should be divided between two or more individuals
End users cannot set security for themselves
Managers must monitor owners for security purposes
Jobs be rotated among different individuals
Rate this question:
Single-factor authentication system
Dual-prong verification system
Multi-factor authentication system
Token-passing authentication system
Rate this question:
NTRUEncrypt
ECC
RC4
SHA-512
Rate this question:
OAuth
CardSpace
OpenID
All SSO technologies use tokens.
Rate this question:
DES
AES
RC4
RIPEMD
Rate this question:
DAP
LDAP
IEEE X.501
Lite RDAP
Rate this question:
Authentication
Identification
Authorization
Access
Rate this question:
Resetting
Capturing
Social engineering
Online guessing
Rate this question:
SSO Login Resource (SSO-LR)
Windows CardSpace
OpenID
Windows Live ID
Rate this question:
Authentication server
Supplicant
Authenticator
User
Rate this question:
Discretionary Access Control
Security Access Control
Mandatory Access Control
Restricted Access Control
Rate this question:
Windows Register Settings
Group Policy
Resource Allocation Entities
AD Management Services (ADMS)
Rate this question:
Is restricted and cannot be accessed
Is assigned a label
Can be changed by the owner
Must be given a number from 200–900
Rate this question:
Secure OS
Trustworthy OS
Managed OS
Trusted OS
Rate this question:
IEEE 802.1x
RADIUS
Kerberos
LDAP
Rate this question:
Plaintext
Cleartext
Opentext
Ciphertext
Rate this question:
Bank automatic teller machine (ATM)
Encrypting and decrypting e-mail attachments
Verifying a user password entered on a Linux system
Determining the integrity of a message
Rate this question:
Alice’s private key
Alice’s public key
Bob’s public key
Bob’s private key
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.