Q1. Which of the following is NOT accomplished by accounting?
1) Tracking a user’s activity on a network.
2) Recording the amount of time spent on a network.
3) Restricting user access to a confidential department.
4) Recording the amount of data transferred during a particular transaction
Q2. EAP authenticator validates EAP peer credentials from its database. True or false?
1) True
2) False
Q3. Which of the following is true regarding a RADIUS protocol?
1) Only the username is encrypted.
2) Only the password is encrypted.
3) Both username and password are encrypted.
4) None of them is encrypted.
Q4. Which of the following is/are true regarding a RADIUS protocol?
1) A database is used by RADIUS to authenticate users.
2) RADIUS has a separate database for accounting, which is used to track network activities.
3) RADIUS uses the same database for authenticating users and tracking their activities.
4) RADIUS has two databases; both are used for authentication and accounting, depending upon their availability.
Q5. Which of the following is true regarding a TACACS+ protocol?
1) Only the username is encrypted.
2) Only the password is encrypted.
3) Both the username and password are encrypted.
4) None of them is encrypted.
Q6. What is the benefit of using TACACS+ for user authentication?
1) It is an open standard.
2) It only encrypts the password of users.
3) It provides command authorization.
4) It is mostly used for user administration
Q7. Which of the following are active visibility techniques?
1) SNMP trap
2) SNMP polling
3) WMI
4) DHCP
Q8. Inspecting the security posture of a device for anti-virus is a post-admission control process for preventing malicious attacks on a network. True or false?
1) True
2) False
Q9. What is the functionality of a Syslog server?
1) It provides authentication.
2) It provides authorization.
3) It is a central repository of logs.
4) It provides a spanning feature.
The correct answer and explanation is:
Here are the correct answers with explanations:
Q1. Which of the following is NOT accomplished by accounting?
Answer: 3) Restricting user access to a confidential department.
Explanation:
Accounting primarily involves tracking user activities, such as the amount of time spent on a network and data transferred. It does not restrict user access to specific departments; this is a function of access control, not accounting.
Q2. EAP authenticator validates EAP peer credentials from its database. True or false?
Answer: 2) False
Explanation:
The EAP (Extensible Authentication Protocol) authenticator forwards credentials to an authentication server, like RADIUS, for validation. It doesn’t validate credentials directly.
Q3. Which of the following is true regarding a RADIUS protocol?
Answer: 2) Only the password is encrypted.
Explanation:
In RADIUS, the user’s password is encrypted to provide security. However, other information, like the username, is sent in plain text, which can be a vulnerability.
Q4. Which of the following is/are true regarding a RADIUS protocol?
Answer: 3) RADIUS uses the same database for authenticating users and tracking their activities.
Explanation:
RADIUS employs a single database for authentication and accounting. This ensures that all data is centralized, simplifying network management and tracking.
Q5. Which of the following is true regarding a TACACS+ protocol?
Answer: 3) Both the username and password are encrypted.
Explanation:
TACACS+ encrypts the entire payload, including usernames and passwords, ensuring greater security compared to RADIUS.
Q6. What is the benefit of using TACACS+ for user authentication?
Answer: 3) It provides command authorization.
Explanation:
TACACS+ offers fine-grained control by allowing administrators to authorize specific commands for users. This makes it ideal for environments where granular control over administrative tasks is necessary.
Q7. Which of the following are active visibility techniques?
Answer: 2) SNMP polling, 3) WMI
Explanation:
SNMP polling actively queries devices for status information. Similarly, WMI (Windows Management Instrumentation) provides visibility into systems by gathering real-time data. SNMP traps and DHCP are passive techniques.
Q8. Inspecting the security posture of a device for anti-virus is a post-admission control process for preventing malicious attacks on a network. True or false?
Answer: 1) True
Explanation:
Post-admission controls inspect devices after they are connected to the network to ensure they meet security requirements, such as having up-to-date anti-virus software.
Q9. What is the functionality of a Syslog server?
Answer: 3) It is a central repository of logs.
Explanation:
A Syslog server collects, stores, and analyzes log data from network devices. This helps administrators monitor system health, detect issues, and maintain security. It doesn’t handle authentication or authorization.
These answers highlight the roles and functionalities of key protocols and tools used in network security and management. Each answer aligns with the underlying principles of secure network operations.