Q1
What is a feature of the TACACS+ protocol?
Options:
A) It utilizes UDP to provide more efficient packet transfer.
B) It encrypts the entire body of the packet for more secure communications.
C) It combines authentication and authorization as one process.
D) It hides passwords during transmission using PAP and sends the rest of the packet in plaintext.
Answer: B) It encrypts the entire body of the packet for more secure communications.
1/10
| Term | Definition |
|---|---|
| Q1 What is a feature of the TACACS+ protocol? Options: A) It utilizes UDP to provide more efficient packet transfer. B) It encrypts the entire body of the packet for more secure communications. C) It combines authentication and authorization as one process. D) It hides passwords during transmission using PAP and sends the rest of the packet in plaintext. | Answer: B) It encrypts the entire body of the packet for more secure communications. |
| Q2 Which two protocols are used to provide server-based AAA authentication? (Choose two.) Options: A) TACACS+ B) SNMP C) RADIUS D) SSH E) 802.1x | Answers: A) TACACS+ C) RADIUS |
| Q3 Which functionality does the TACACS single-connection keyword provide to AAA services? Options: A) Maintains a single UDP connection for the life of the session. B) Enhances the performance of the TCP connection. C) Allows the use of differing keys between the TACACS+ server and the AAA client. D) Encrypts the data transfer between the TACACS+ server and the AAA client. | Answer: B) Enhances the performance of the TCP connection. |
| Q4 What are three access control security services? (Choose three.) Options: A) Availability B) Access C) Authorization D) Authentication E) Accounting F) Repudiation | Answers: C) Authorization D) Authenticationa E) Accounting |
| Q5 What is the purpose of the network security accounting function? Options: A) To require users to prove who they are B) To determine which resources a user can access C) To keep track of the actions of a user D) To provide challenge and response questions | Answer: C) To keep track of the actions of a user |
| Q6 What does the TACACS+ protocol provide in a AAA deployment? Options: A) Authorization on a per-user or per-group basis B) Password encryption without encrypting the packet C) Compatibility with previous TACACS protocols D) AAA connectivity via UDP | Answer: A) Authorization on a per-user or per-group basis |
| Q7 Which term describes the ability of a web server to keep a log of the users who access the server, as well as the length of time they use it? Options: A) Authorization B) Accounting C) Authentication D) Assigning permissions | Answer: B) Accounting |
| Q8 What is the first required task when configuring server-based AAA authentication? Options: A) Configure the type of AAA authentication. B) Enable AAA globally. C) Configure the IP address of the server. D) Specify the type of server providing the authentication. | Answer: B) Enable AAA globally. |
| Q9 What is a characteristic of AAA accounting? Options: A) Users are not required to be authenticated before AAA accounting logs their activities on the network. B) Accounting can only be enabled for network connections. C) Possible triggers for the aaa accounting exec default command include start-stop and stop-only. D) Accounting is concerned with allowing and disallowing authenticated users access to certain areas and programs on the network. | Answer: C) Possible triggers for the aaa accounting exec default command include start-stop and stop-only. |
| Q10 When a method list for AAA authentication is being configured, what is the effect of the keyword local? Options: A) It defaults to the vty line password for authentication. B) The login succeeds, even if all methods return an error. C) It accepts a locally configured username, regardless of case. D) It uses the enable password for authentication. | Answer: C) It accepts a locally configured username, regardless of case. |