70-411 R2 Test Bank Lesson 15 - 70411TestBank,...

This preview shows page 1 - 4 out of 10 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
CompTIA Security+ Guide to Network Security Fundamentals
The document you are viewing contains questions related to this textbook.
Chapter 14 / Exercise 18
CompTIA Security+ Guide to Network Security Fundamentals
Ciampa
Expert Verified
70-411 Test Bank, Lesson 15 Configuring Service Authentication16 Multiple Choice 6 Short Answer 4 Best Answer 3 Build List  4 Repeated Answer 33 questions Multiple Choice1. What is the default authentication protocol for non-domain computers?a. NTLMb. PAPc. CHAPd. KerberosAnswer: aDifficulty: EasySection Ref: Configuring Server AuthenticationExplanation: Although Kerberos is the default authentication protocol for today’s domain computers, NTLM is the default authentication protocol for Windows NT, standalone computers that are not part of a domain, and situations in which you authenticate to a server using an IP address.
2. What does the acronym NTLM stand for?
3. NTLM uses a challenge-response mechanism for authentication without doing what?
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
CompTIA Security+ Guide to Network Security Fundamentals
The document you are viewing contains questions related to this textbook.
Chapter 14 / Exercise 18
CompTIA Security+ Guide to Network Security Fundamentals
Ciampa
Expert Verified
Difficulty: MediumSection Ref: Understanding NTLM AuthenticationExplanation: NTLM uses a challenge-response mechanism for authentication in which clients can prove their identities without sending a password to the server.4. What type of protocol is Kerberos?a. a secure network authentication protocolb. a simple Microsoft-only protocolc. a uni-directional authentication protocold. a certificate-based authentication protocolAnswer: aDifficulty: MediumSection Ref: Managing KerberosExplanation: Kerberos is a computer network authentication protocol that allows hosts to prove their identity securely over a non-secure network.5. Kerberos security and authentication are based on what type of technology?a. secure transmissionb. secret keyc. challenge-responsed. legacy codeAnswer: bDifficulty: MediumSection Ref: Managing KerberosExplanation: With Kerberos, security and authentication are based on secret-key technology. Every host on the network has its own secret key.6. What is the default maximum allowable time lapse between domain controllers and client systems for Kerberos to work correctly?
Difficulty: Medium
Section Ref: Managing Kerberos

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture