What protocol offers the capability to deploy RADIUS in an Ethernet network?
EAP
The security administrator for Corp.com has been directed by the ClO to implement a secure wireless authentication method that uses a remote RADIUS server for authentication. Which of the following authentication methods should be used?
LEAP
Which of the following are both an access server and also a system of distributed security that secures remote access against improper attempts?
RADIUS
A system administrator is using a packet sniffer to troubleshoot remote authentication. The sniffer detects a device trying to communicate on UDP ports 1812 and 1813. Which of the following authentication methods is being attempted?
RADIUS.
What is the core principle behind RADIUS?
Distributed security
Access control models are created by ?
Hardware or software
By default, how often are group policies updated?
At computer start At user login Every 1 to 2 hours All of these are correct
Which of these access models gives the user total control over an object?
DAC
Which of these access control models is the most restrictive?
MAC
The what tab on the folder's Properties dialog box will show you the permissions assigned to each Access Control Entry?
Security
The what tab on the folder's Advanced Properties dialog box will show you the folder's owner?
Advanced
True or false? Owners of a file have full control of the object when using DAC Access control method
True
The what group has the right, by default, to assign or take ownership of a file or folder?
Administrators
Once a user has taken what if the folder or file, they implicitly have full control over the object?