Authentication, Authorization, Accounting Quiz

19. Fill in the blank: In the world of AAA security, “authz” is short for _____.

  • authoritarian
  • authorization
  • authored
  • authentication

20. In the three A’s of security (AAA), what is the process of proving who you claim to be?

  • Authentication
  • Authored
  • Authorization
  • Accounting

21. Which of the following are valid multi-factor authentication factors? Select all that apply.

  • Something you have
  • Something you know
  • Something you did
  • Something you are

22. Which of the following might serve as a multifactor authentication mechanism when used along with a password? Select all that apply.

  • PIN
  • Passphrase
  • Bank card
  • Fingerprint

23. If an organization want to issue and sign client certificates, what will it need to set up?

  • A CA infrastructure
  • An LDAP infrastructure
  • An ID infrastructure
  • A CRL infrastructure

24. In LDAP language, what do we call the folder an object belongs to?

  • A distinguished name (DN)
  • An organizational unit (OU)
  • TLS
  • A data information tree

25. Fill in the blank: The authentication server is to authentication as the ticket granting service is to _____.

  • integrity
  • identification
  • authorization
  • verification

26. Consider the following scenario: Multiple client switches and routers have been set up at a small military base. The network team decided to implement Terminal Access Controller Access-Control System Plus (TACACS+), along with Kerberos, and an external Lightweight

Directory Access Protocol (LDAP) service. What is the primary reason TACACS+ was chosen for this?

  • NIPRNet
  • Network access
  • *A: Device administration
  • Single Sign-On

27. Consider the following scenario: A network admin deployed a Terminal Access Controller Access Control System Plus (TACACS+) system so other admins can properly manage multiple switches and routers on the Local Area Network (LAN). The system will keep track and log admin access to each device and the changes made. This “logging” satisfies which part of the three A’s of security?

  • Accounting
  • Authorization
  • Administration
  • Authentication

28. Which of the following is a way to define permissions or authorizations for objects?

  • Network access servers (NAS)
  • Extensible authentication protocols
  • Access control lists (ACL)
  • Access control entries

Shuffle Q/A 1

29. Fill in the blank: _____ is the idea of describing an entity uniquely.

  • Eligibility
  • Validity
  • Authorization
  • Identification

30. Which of the following passwords is the strongest for authenticating to a system?

  • P@55w0rd!
  • P@ssword!
  • P@w04d!$$L0N6
  • Password!

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply