100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU 178 CompTIA Security+ Focused on Chapter 1 & 2 Problem Solving Exam Questions with Complete Answers 2024/2025 $11.49   Add to cart

Exam (elaborations)

WGU 178 CompTIA Security+ Focused on Chapter 1 & 2 Problem Solving Exam Questions with Complete Answers 2024/2025

 3 views  0 purchase
  • Course
  • WGU 178 CompTIA Security
  • Institution
  • WGU 178 CompTIA Security

WGU 178 CompTIA Security+ Focused on Chapter 1 & 2 Problem Solving Exam Questions with Complete Answers 2024/2025 Security Assertions Markup Language (SAML) - correct answer is an XML-based standard used to exchange authentication and authorized information between different parties. Remote A...

[Show more]

Preview 2 out of 8  pages

  • August 29, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU 178 CompTIA Security
  • WGU 178 CompTIA Security
avatar-seller
KieranKent55
WGU 178 CompTIA Security+ Focused on
Chapter 1 & 2 Problem Solving Exam
Questions with Complete Answers 2024/2025

Security Assertions Markup Language (SAML) - correct answer is an XML-based
standard used to exchange authentication and authorized information between different
parties.


Remote Authentication Dial-In User Service (RADIUS) - correct answer Provides
central authentication for remote access clients. Uses symmetric encryption to encrypt
the password packets and it uses UDP. Only encrypts the password


Extended Terminal Access Controller Access-Control System+ (TACAS+) - correct
answer An improvement over TACAS developed by Cisco Systems and proprietary to
Cisco systems.


Terminal Access Controller Access-Control System+(TACAS+) - correct answer
Provides central authentication for remote access clients and used as an alternative to
RADIUS. It encrypts the entire authentication process


Port 49 - correct answer What port does TACAS+ use?


AAA protocol - correct answer Authentication, Authorization, Accounting. These
protocols are used in remote access systems. TACAS+ is an example of this.
Authentication verifies the user's identification. Authorization determines if a user should
have access and Accounting tracks a user's access with logs.


HMAC-based One-Time Password (HOTP) - correct answer An open standard used
for creating one-time passwords, similar to those used in tokens or key fobs. It
combines a secret key an an incrementing counter and then uses HMAC to create a
hash of the result. These passwords do not expire until they are used.


Time-based One-Time Password (TOTP) - correct answer Uses a timestamp instead
of a counter. One-time passwords created with this expire after 30 seconds.

, Hash-based Message Authentication Code (HMAC) - correct answer A hashing
algorithm used to verify integrity and authenticity of a message with the use of a shared
secret.


Extensible Authentication Protocol(EAP) - correct answer An authentication framework
that provides general guidance for authentication methods.


User Acceptance Testing (UDP) - correct answer One of the last phases of testing an
application before its release


Diameter - correct answer An improvement over RADIUS and it supports Extensible
Authentication Protocol (EAP) for security


PAP, CHAP, MS-CHAPv2 RADIUS, Diameter, XTACAS, TACASCS+ an - correct
answer What are some remote access authentication mechanisms?


Point to Protocol (PPP) - correct answer Used to create remote access connections.
Used by PAP and CHAP


Technical (implemented with technology), management ( using administrative methods)
and operational (for day to day operations. - correct answer The common
implementation classifications include:


Technical Controls - correct answer Use technology to reduce vulnerabilities. Some
examples include encryption, antivirus software, IDSs, firewalls and the principle of least
privilege.


Motion detectors and fire suppression systems - correct answer Technical physical
security and environmental controls include:


Management Controls - correct answer Use planning and assessment methods to
reduce and manage risk. Some examples include: risk assessments, vulnerability
assessments, and penetration tests

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78600 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart