Financial Accounting > STUDY GUIDE > DeVry University, Chicago - SEC 453 chapter 3 Study Guide with complete solution (All)
SEC453 Study Guide Chapter 3 – Authentication, Authorization, and Accounting 1. Define and compare each of the three concepts of Authentication, Authorization, and Accounting. 2. Describe t... he basic vulnerability of using router-based authentication. 3. Within a network, describe a basic difference between router-based authentication and network server-based authentication. 4. Describe both character and packet modes of user access. Identify at least one router or switch access method that uses each access method. 5. Of the three “A”s, which one requires a server for its support? 6. Describe the operations involved when creating a router or switch-based local AAA service. 7. Given a typical router or switch, identify the access methods to that device. Should all access methods require some form of authentication? 8. Describe two ways to “fine-tune” authentication. 9. Describe and be able to draw a network showing the use of centralized server-based AAA. 10. Name and describe the differentiating characteristics of the two predominant protocols used between network components and an AAA server. 11. List two authentication protocols. 12. Given the CONSole, AUXiliary, and regular Ethernet interfaces of a router, which ones use character-based and which use packet-based access methods? 13. What is the name of the new password encryption standard available with the Cisco IOS 15 operating system? 14. What are adaptive security appliances? How do they differ from routers? 15. When a user accesses a network router, what happens first, authentication or authorization? 16. In local mode, can a router provide all authentication, authorization and accounting operations? 17. Which AAA server type, TACACS+ or RADIUS, has the most extensive accounting resources? 18. Can a router, using local authentication methods, provide for more than a single administrative user name? 19. If multiple user names are allowed on a router using local authentication methods, can the different users be delegated different levels of administrative access? 20. Can different authentication methods be applied to specific interfaces or lines? 21. What is the purpose of the “login delay” command? 22. Name two access protocols that can be configured on the serial interface of a router. 23. What information is displayed when the “show aaa sessions” command is executed? 24. What is the GUI-based application that can be used to enable or disable AAA on a router? 25. Name two database types that can work with Cisco’s AAA. 26. Is “RADIUS” the name of a server, or is it the protocol used for communication between routers and a central AAA server? 27. Which centralized AAA protocol is an open IETF standard AAA protocol? 28. Can a Cisco Secure ACS work with both IPv4 and IPv6 networks? 29. What is “TrustSec”? 30. What are the three advantages of the Cisco Secure ACS? [Show More]
Last updated: 2 years ago
Preview 1 out of 5 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Dec 22, 2020
Number of pages
5
Written in
This document has been written for:
Uploaded
Dec 22, 2020
Downloads
0
Views
104
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·