Which of the following VPN authentication methods is considered the most secure quizlet?
Port authentication Show
EXPLANATION A password, a biometric scan, and a token device EXPLANATION Token device, keystroke analysis, cognitive question EXPLANATION You are the security administrator for a medium-sized company that needs to enforce a much stricter password policy via group policy. The aims of this policy are to do the following: - Prevent using the same password within 12 password changes. Select the options that you will need to fulfill all of these
goals. How does a DirectAccess client determine whether it is on the internal network or external network? If the client can resolve enterpriseregistration.domain.com then it is external If latency to the network location server is above 40 milliseconds then it is external If the client can resolve enterpriseregistration.domain.com then it is internal If the client can connect to the network location server then it is internal If the client can connect to the network location server then it is external VPN concentrator With a remote access VPN, a server on the edge of a network (called a VPN concentrator) is configured to accept VPN connections from individual hosts. Hosts that are allowed to connect using the VPN connection are granted access to resources on the VPN server or the private network. A demilitarized zone (DMZ), also called a screened subnet, is a buffer network (or subnet) that sits between the private network and an untrusted network (such as the internet). A RADIUS server is used to centralize authentication, authorization, and accounting for multiple remote access servers. However, clients still connect to individual remote access servers. An intrusion detection system (IDS) is a special network device that can detect attacks and suspicious activity. A passive IDS monitors, logs, and detects security breaches, but it does not take action to stop or prevent an attack. An active IDS (also called an intrusion protection system or IPS) performs the functions of an IDS but can also react when security breaches occur. When selecting authentication types for an RAS server what is considered to be the most secure authentication type?Given this challenge response mechanism for authentication, NTLM is considered more secure than either basic or digest authentication. Whenever possible, it should be used rather than those two authentication types.
Which encryption protocols might be used to secure a VPN connection quizlet?As long as strong tunneling ciphers and protocols are used, the VPN provides sufficient encryption to secure the connection, even though the wireless network itself is not encrypted. It is recommended that you use IPsec or SSL to secure the VPN, as these protocols are relatively secure.
Which of the following are differences between RADIUS and Tacacs +?RADIUS was designed to authenticate and log remote network users, while TACACS+ is most commonly used for administrator access to network devices like routers and switches.
Which security protocol is used in VPNs and is a combination of Microsoft's Point to Point Tunneling Protocol and Cisco's Layer 2 Fowarding?L2TP is an Internet Engineering Task Force (IETF) standard that combines the best features of two existing tunneling protocols: Cisco's Layer 2 Forwarding Protocol (L2F) and PPTP. L2TP has replaced Cisco's own proprietary L2F protocol. L2TP is a key building block for VPNs in the dial access space.
|