Day 44 Back to Exams Page Page 1 of 1Uncategorized 1. For AAA, ______ is used to validate user identity before allowing access to network resources.AccountingAuthenticationAuthorizationAccessing 2. For Authentication, the validation is based on verifying user credentials, which can be any of the following:Something the user knowsSomething the user isSomething the user possessesSomething the user does 3. In order for AAA to work, the Network Access Server (NAS) must be able to access security information for a specific user before providing AAA services.TrueFalse 4. RADIUS is an open-standard protocol that is distributed in C source code format.TrueFalse 5. RADIUS communication is triggered by a user login that consists of a query.TrueFalse 6. The TACACS+ authentication phase uses three distinct packet types, as follows:CLOSE packetsSTART packetsREPLY or RESPONSE packetsCONTINUE packets 7. You would globally enable AAA services using the _______ command in global configuration mode.aaaaaa newaaa new-modelaaa enable 8. ____ logs are generated by network devices to create a record of actions a device takes or the changes a device observes.TriggerEventSystemSecure 9. ____ are bits of information stored by a browser on a local hard drive.BotsCrumbsCookiesNuggets 10. Extensible Markup Language (XML) injection has a lot in common with LDAP and SQL injection.TrueFalse 11. ______ is the practice of publicly tagging an area in which wireless networks are accessible; it is commonly paired with wardriving.WarscoringWarpenningWarmarkingWarchalking 12. Bluetooth hijacking, or ____, takes advantage of vulnerabilities in Bluetooth technology to send unauthorized messages or other informationbluewalkingbluechalkingbluejackingbluehacking 13. Vishing is just phishing run over a phone call.TrueFalse 14. A computer is often used in a botnet to participate in DDoS attacks as a mail relay to send spam e-mail or to harness the computer’s power for a specific use.TrueFalse 15. ____ function by inserting themselves between the operating system and the user environment or by modifying the operation of the operating system itself.spybotsviruseswormsrootkits 16. The last component comprising the CIA model is ______. authorizationauthenticationavailabilityaccounting 17. A hot site is a location that is a near replica of the production environment in terms of equipment, data, power, and connectivity. It usually only requires minimal work to resume operations at the new site. Data backups are usually stored at a hot site.TrueFalse Loading...