Module 8 Questions
Module 8 Questions
Answer: C
Explanation: DAC allows owners of resources to specify who can access them. This means access is
granted at the user's discretion. MAC (A) is determined by a central authority using security labels, RBAC
(B) grants access based on roles, and TBAC (D) is based on task requirements.
A) DAC
B) RBAC
C) LBAC
D) TBAC
Answer: C
Explanation: LBAC (Lattice-Based Access Control) uses security labels arranged in a lattice structure. DAC
(A) is determined by resource owners, RBAC (B) uses roles, and TBAC (D) is based on tasks.
A) Security clearance.
B) Owner’s discretion.
Answer: C
Explanation: RBAC grants access based on a user's role within the organization. Security clearance (A) is
a characteristic of MAC, owner's discretion (B) is DAC, and specific task (D) is TBAC.
B) MAC is determined by the central authority while DAC allows the owner to decide.
Explanation: MAC is determined by a central authority using security labels, whereas DAC allows the
resource owner to decide access. The other options confuse the definitions of MAC, DAC, RBAC, and
LBAC.
A) Role assignments.
B) Owner decisions.
C) Security labels.
Answer: D
Explanation: TBAC controls access based on the specific task or operation a user is currently performing.
The other options describe RBAC (A), DAC (B), and LBAC (C).
6. Which access control model uses a matrix to represent roles and their associated privileges?
A) TBAC
B) MAC
C) LBAC
D) RBAC
Answer: D
Explanation: RBAC often employs a matrix to show roles and their associated privileges. The other
options do not commonly use a matrix in this way.
7. If a user is granted access to a file because they are the owner, this is an example of which
type of access control?
A) MAC
B) DAC
C) RBAC
D) TBAC
Answer: B
Explanation: DAC allows the resource owner to determine access. MAC (A) uses security labels, RBAC (C)
relies on roles, and TBAC (D) is based on tasks.
8. In which access control model are security levels and classifications commonly used?
A) DAC
B) TBAC
C) MAC
D) RBAC
Answer: C
Explanation: MAC uses security levels and classifications to determine access. DAC (A) is owner-
determined, TBAC (B) focuses on tasks, and RBAC (D) is based on roles.
9. A system that dynamically adjusts a user's access rights based on their current task is
implementing:
A) DAC
B) MAC
C) RBAC
D) TBAC
Answer: D
Explanation: TBAC dynamically adjusts access based on the current task or activity of the user. DAC (A) is
based on owner decisions, MAC (B) uses security labels, and RBAC (C) relies on roles.
10. Which access control model is most associated with a hierarchical arrangement of security
labels?
A) RBAC
B) DAC
C) TBAC
D) LBAC
Answer: D
Explanation: LBAC uses a hierarchical or lattice arrangement of security labels to determine access. RBAC
(A) uses roles, DAC (B) is owner-determined, and TBAC (C) is task-based.
11. A military organization assigns labels such as "Top Secret" and "Classified" to data and ensures
that only personnel with matching clearances can access them. This is an example of:
A) DAC
B) MAC
C) RBAC
D) TBAC
Answer: B
Explanation: MAC uses labels and clearances to dictate access. DAC (A) depends on
owner discretion, RBAC (C) uses roles, and TBAC (D) is based on tasks.
12. A system grants access to files based on the owner's personal decisions about which users can
access them. This exemplifies:
A) DAC
B) MAC
C) LBAC
D) RBAC
Answer: A
Explanation: DAC grants access based on the owner's discretion. MAC (B) uses labels,
LBAC (C) uses a hierarchical structure of labels, and RBAC (D) uses roles.
13. In a hospital, a doctor is allowed to view patient records because of their job role. This
represents:
A) DAC
B) TBAC
C) LBAC
D) RBAC
Answer: D
Explanation: RBAC assigns permissions based on roles. DAC (A) uses owner discretion,
TBAC (B) is based on tasks, and LBAC (C) uses a lattice of labels.
14. A system where access permissions are structured in a lattice, with hierarchies such as "Low",
"Medium", and "High", is using:
A) MAC
B) RBAC
C) DAC
D) LBAC
Answer: D
Explanation: LBAC uses a hierarchical or lattice arrangement of labels. MAC (A) uses
labels but not necessarily in a hierarchical manner, RBAC (B) uses roles, and DAC (C)
depends on owner discretion.
15. A cashier at a store can process sales but cannot approve returns. This task-specific restriction
exemplifies:
A) DAC
B) MAC
C) TBAC
D) RBAC
Answer: C
Explanation: TBAC provides access based on specific tasks. DAC (A) is based on owner
discretion, MAC (B) uses labels, and RBAC (D) focuses on roles.
16. In which model can a document owner decide to share their file with specific colleagues?
A) MAC
B) RBAC
C) TBAC
D) DAC
Answer: D
Explanation: In DAC, the discretion of access lies with the owner. MAC (A) uses security
labels, RBAC (B) relies on roles, and TBAC (C) is based on tasks.
17. A software development company restricts access to certain project repositories based on an
engineer's current project assignment. This method of access is known as:
A) DAC
B) MAC
C) RBAC
D) TBAC
Answer: D
Explanation: TBAC is based on the specific tasks or activities a user is currently engaged
in. DAC (A) relies on owner discretion, MAC (B) uses labels, and RBAC (C) focuses on
roles.
18. Which model determines access based on security classifications and clearances, without
regard to user roles or tasks?
A) RBAC
B) DAC
C) MAC
D) TBAC
Answer: C
Explanation: MAC is characterized by security labels and clearances. RBAC (A) uses roles,
DAC (B) depends on owner discretion, and TBAC (D) is task-centric.
19. A cloud platform assigns permissions based on user roles such as "Admin", "Developer", or
"Viewer". This is an example of:
A) DAC
B) TBAC
C) MAC
D) RBAC
Answer: D
Explanation: RBAC is based on roles. DAC (A) is owner-driven, TBAC (B) is based on tasks,
and MAC (C) uses labels.
20. In an organization, access to resources is given based on the lattice levels "L1", "L2", and "L3",
where "L3" is the highest privilege. This kind of system is:
A) RBAC
B) DAC
C) TBAC
D) LBAC
Answer: D
Explanation: LBAC often utilizes a hierarchical arrangement of labels in a lattice structure. RBAC
(A) is role-based, DAC (B) is owner-determined, and TBAC (C) focuses on tasks.
21. In the context of access control, which model typically associates labels such as "Top Secret" or
"Classified" with data and also assigns matching clearances to users?
Answer: B
Explanation: MAC traditionally uses labels for data and clearances for users. While ACLs
(Access Control Lists) define what operations can be performed by which entities, it is
commonly associated with MAC in contexts where labeled data is involved. Capabilities
tables, on the other hand, list the operations a particular entity can perform, which isn't
the defining aspect of MAC.
22. Which of the following best describes an Access Control List (ACL)?
Answer: B
Explanation: An ACL is associated with a particular resource and specifies which entities
have permission to access or manipulate that resource and in what way.
23. A file in a system has an associated list detailing that User A can read and write, while User B
can only read. This is an example of:
A) Capabilities Table
B) Role-Based Access
Answer: D
Explanation: This is the essence of an ACL, where specific permissions are associated
directly with a resource, and it dictates who can perform what operations on it.
24. A system uses a table that indicates User X can access Files Y and Z, while User A can access
File B. What best describes this system?
B) Capabilities Table
Answer: B
Explanation: A capabilities table lists what resources an entity (often a user or process)
can access, which fits the description provided.
25. In a MAC system, how is the decision made regarding a user's access to a file?
A) Based on the user's role in the organization.
Answer: C
Explanation: MAC systems base access decisions on matching a user's clearance level
with the security label of the data or resource. If the clearance level matches or exceeds
the label, access is granted.
26. Which of the following refers to the process of verifying the identity of a user, system, or
application?
A) Identification
B) Authentication
C) Authorization
D) Accountability
Answer: B
27. When a user provides a username to a system, which process is being initiated?
A) Authorization
B) Accountability
C) Identification
D) Authentication
Answer: C
28. After verifying a user's identity, what step ensures the user has the correct permissions to
perform certain actions?
A) Identification
B) Authentication
C) Authorization
D) Accountability
Answer: C
29. Which mechanism keeps track of user actions and ensures that users can be held responsible
for their actions on a system?
A) Authentication
B) Authorization
C) Identification
D) Accountability
Answer: D
A) Authorization
B) Accountability
C) Authentication
D) Identification
Answer: C
31. Role-Based Access Control (RBAC) is mainly concerned with which aspect of access control?
A) Identification
B) Authentication
C) Authorization
D) Accountability
Answer: C
32. Which process involves an entity claiming a specific identity, usually through a unique
identifier?
A) Authentication
B) Authorization
C) Accountability
D) Identification
Answer: D
33. Biometric systems, like fingerprint or facial recognition, are mainly used in which of the
following processes?
A) Identification
B) Authorization
C) Authentication
D) Accountability
Answer: C
34. Which of the following ensures that an individual's actions on a system can be traced back to
them?
A) Authentication
B) Identification
C) Authorization
D) Accountability
Answer: D
Explanation: Accountability involves tracking and logging actions to ensure that they can
be attributed to a specific individual.
35. When a system checks if a user has the rights to access a specific file, which process is taking
place?
A) Authentication
B) Authorization
C) Identification
D) Accountability
Answer: B
Explanation: Authorization determines the permissions and rights a user has, such as accessing a
specific file.
36. Which of the following is an example of the authentication factor "something you know"?
A) Fingerprint scan
B) Security token
C) Password
D) Smart card
Answer: C
37. A bank sends a one-time code to your mobile phone for you to enter during login. This code is
an example of:
C) Something you do
Answer: D
38. Which of the following authentication mechanisms is based on "something you are"?
A) Password
B) Retina scan
C) Hardware key
D) Digital certificate
Answer: B
A) One
B) Two
C) Three
D) Four
Answer: B
Explanation: As the name implies, two-factor authentication requires evidence from two
distinct categories, such as "something you know" (like a password) and "something you
have" (like a mobile phone to receive a code).
40. Using a digital certificate stored on a USB token for authentication corresponds to which
factor?
B) Something you do
Answer: D
41. Which biometric method involves analyzing the patterns of blood vessels in the retina?
A) Fingerprint scan
B) Retina scan
C) Facial recognition
D) Voice recognition
Answer: B
Explanation: A retina scan involves capturing the unique patterns of blood vessels in the
retina, located at the back of the eye. This might be illegal under GPDR due to health
info revealed by a retina scan (diabetes). Compare this to an Iris scan which does not
have these issues.
42. What is the term for when a biometric system mistakenly denies access to an authorized user?
A) False Acceptance
B) Crossover Error
C) False Reject
D) Authentication Error
Answer: C
Explanation: A False Reject Rate (FRR) indicates the likelihood of a biometric system
wrongly denying access to someone who should be allowed.
43. Which metric indicates the likelihood of a biometric system incorrectly granting access to an
unauthorized user?
Answer: B
Explanation: The False Acceptance Rate (FAR) measures how often a biometric system
incorrectly allows access to someone who should be denied.
44. In a biometric system, what does the Crossover Error Rate (CER) represent?
A) The rate at which the system both accepts and rejects an input simultaneously.
B) The rate at which the False Acceptance Rate equals the False Reject Rate.
Answer: B
Explanation: CER represents the point at which the FAR and FRR are equal, often used as
a general performance metric for biometric systems.
45. Voiceprints used to verify a person's claimed identity is an example of which biometric access
control mechanism?
A) Palm geometry
B) DNA matching
C) Voice recognition
D) Iris scan
Answer: C
Explanation: Voice recognition utilizes voiceprints, which are unique patterns in each
individual's voice, to verify their identity.
46. Which biometric technique identifies individuals based on the unique patterns in their eyes,
but not the retina?
A) Fingerprint recognition
B) Voice recognition
C) Retina scan
D) Iris scan
Answer: D
Explanation: An iris scan captures the unique patterns present in the iris, the colored
part of the eye, as opposed to the retina.
47. Which of the following can significantly improve the security of a biometric system?
Answer: A
Explanation: A lower CER indicates a more accurate system because both the FAR and
FRR are lower, making the system more secure.
48. When two different biometric methods, such as fingerprinting and facial recognition, are used
in tandem, this is called:
A) Biometric overlay
B) Dual authentication
D) Crossover authentication
Answer: C
49. Which of the following is the primary concern when the False Acceptance Rate is too high?
Answer: B
Explanation: A high FAR means unauthorized users are more likely to be mistakenly
granted access.
50. A system that measures the way an individual types on a keyboard is using which biometric
method?
A) Voice recognition
B) Keystroke dynamics
C) Iris scan
D) Hand geometry
Answer: B
Explanation: Keystroke dynamics refers to the unique manner and rhythm in which an individual
types, which can be used as a biometric identifier.
51. The Security Target (ST) within the Common Criteria is best described as:
Answer: A
Explanation: The Security Target (ST) is a document in the Common Criteria that details the
specific security properties and requirements that a product or system (the TOE) aims to
achieve.
52. Which principle is enforced by the Bell-LaPadula model to prevent information from flowing
from a high-security level to a low-security level?
Answer: A
Explanation: The Simple Security Property, often called "no read up" (or "ss-property" or
"no read up, no write down"), ensures that a subject with a lower security clearance
cannot read data at a higher security level.
53. In the Bell-LaPadula model, which principle ensures that subjects with a high-security
clearance cannot write to objects (like files) at a lower security level?
Answer: A
Explanation: The Star Property, often termed "no write down" (or "⭐-property"),
ensures that subjects at a higher security level cannot write information to a lower
security level to prevent potential data leaks.
54. Which of the following properties in the Bell-LaPadula model states that security labels on
subjects and objects don't change while the system is operating?
Answer: D
Explanation: The Strong Tranquility Property ensures that the security labels (or
classifications) assigned to subjects and objects remain unchanged while the system is in
operation, ensuring stability in the system's security states.
55. The Bell-LaPadula model is primarily concerned with which of the following aspects of
security?
A) Integrity
B) Availability
C) Confidentiality
D) Accountability
Answer: C
Explanation: The Bell-LaPadula model is primarily designed to protect data
confidentiality in computer security systems.
56. Which of the following best describes discretionary access controls within the Bell-LaPadula
model?
C) Controls based on the user's discretion, typically using Access Control Lists (ACLs).
Answer: C
Explanation: Discretionary access controls in the Bell-LaPadula model allow the owner
of the object (e.g., a file) to grant or deny access to other subjects based on their
discretion, often utilizing Access Control Lists (ACLs).
A) Biba
B) Clark-Wilson
C) Graham-Denning
D) Bell-LaPadula
Answer: D
58. Which integrity model introduces the concepts of well-formed transactions and separation of
duties?
A) Bell-LaPadula
B) Clark-Wilson
C) Biba
D) Graham-Denning
Answer: B
A) Data confidentiality.
B) Data availability.
C) Data integrity.
D) Data repudiation.
Answer: C
Explanation: The "no read down" principle of the Biba model ensures data integrity by
preventing subjects at higher integrity levels from reading data at lower integrity levels.
60. Which model provides a set of eight basic protection rights, including the right to create an
object and the right to destroy an object?
A) Graham-Denning
B) Clark-Wilson
C) Bell-LaPadula
Answer: A
Explanation: The Graham-Denning model defines eight basic protection rights, which
include rights such as creating, destroying, and transferring ownership of objects.
61. The principle of "no write up" in the Bell-LaPadula model ensures:
A) Data integrity.
B) Data confidentiality.
C) Data availability.
D) Data accountability.
Answer: B
Explanation: The "no write up" principle, also known as the Star Property, ensures data
confidentiality by preventing subjects with a lower classification from writing to a higher
classification.
62. Which architecture emphasizes that trust is never implicitly assumed based on any single
factor, like network location?
A) Bell-LaPadula
B) Biba
D) Clark-Wilson
Answer: C
Explanation: Zero Trust Architecture operates on the belief that threats exist both
outside and inside the network, so trust should never be assumed implicitly.
63. Which model focuses on commercial security, addressing the inadequacies of the Bell-
LaPadula and Biba models in that context?
A) Graham-Denning
B) Clark-Wilson
D) Bell-LaPadula
Answer: B
64. Which model focuses primarily on data integrity and prevents data from being degraded by a
lesser integrity level?
A) Bell-LaPadula
B) Biba
C) Clark-Wilson
D) Graham-Denning
Answer: B
Explanation: The Biba model is primarily concerned with data integrity and includes
mechanisms to prevent data at higher integrity levels from being influenced or degraded
by data at lower integrity levels.
65. Which model does not inherently focus on the separation of duties concept?
A) Biba
B) Clark-Wilson
C) Bell-LaPadula
D) Graham-Denning
Answer: A
66. Which architecture/model typically advocates for continuous authentication and authorization
checks throughout a session, not just at the start?
A) Graham-Denning
B) Bell-LaPadula
C) Clark-Wilson
Answer: D
Explanation: The Zero Trust Architecture advocates for continuous authentication and
authorization, ensuring that trust is continually validated throughout a session
Proxy Firewall:
Definition: A proxy firewall, also known as an application-level gateway, is a firewall that acts as
an intermediary between end users and the services they wish to access. When a user sends a
request to access a particular service or server, the request first goes to the proxy firewall. The
firewall then makes a new connection on behalf of the user and retrieves the requested
information, sending it back to the user. By doing so, it effectively hides the true network
addresses and adds an additional layer of security. Proxy firewalls can inspect the entire
application data portion of a packet and provide deep packet filtering, often being used for
content filtering, logging, and caching.
Application Firewall:
Definition: An application firewall specifically filters traffic at the application layer of the OSI
model. It operates by examining the data being transmitted, ensuring that it meets the protocol
standards for the specific application. This type of firewall can be especially effective in detecting
and blocking application-specific attacks, such as SQL injection attacks on a web server. They can
also enforce granular controls, like blocking specific commands in database queries.
Definition: A packet filtering firewall operates at the network layer of the OSI model and makes
decisions on whether to allow or deny traffic based on attributes found in IP packets. These
attributes typically include source and destination IP addresses, port numbers, and the specific
protocol being used (e.g., TCP, UDP). Packet filtering firewalls are often faster than other types
because they only examine the packet headers and not the data payload.
Circuit-Level Gateway:
Definition: A circuit-level gateway operates at the session layer of the OSI model and makes
security decisions based on the establishment of "circuits" or sessions. Once a session between
an internal user and an external service is established and determined to be secure, the gateway
allows traffic to flow between the two without further inspection. It doesn't inspect the actual
data being transferred, but rather focuses on the attributes of the connection itself. This
approach provides a balance between security and performance, allowing for faster data
transfer once a trusted session is established.
Here are more questions.
67. Which type of firewall works at the network layer and makes decisions based on source and
destination IP addresses, port numbers, and protocols?
A) Proxy Firewall
B) Application Firewall
D) Circuit-Level Gateway
Answer: C
Explanation: Packet Filtering Firewalls operate at the network layer and make decisions
based on the attributes of individual packets, such as source and destination IP
addresses, port numbers, and protocols.
Answer: B
Explanation: Static packet filtering uses a consistent set of pre-defined rules to allow or
deny traffic, without considering the state or context of the connection.
69. Which firewall feature keeps track of active connections to determine if an incoming packet is
part of an established connection?
B) State Table
C) Address Restrictions
D) Application Inspection
Answer: B
Explanation: State tables maintain a record of all active connections, allowing the
firewall to determine if an incoming packet is part of an ongoing connection or if it's
unsolicited.
Answer: C
Explanation: Dynamic packet filtering can modify the filtering rules based on observed
traffic patterns or other criteria, offering more adaptive security compared to static
filtering.
Answer: C
Explanation: Stateful packet inspection uses a state table to keep track of active
connections and ensure that packets are part of a legitimate session.
72. What would a firewall use to deny all traffic from a specific IP address?
A) State Table
C) Address Restrictions
D) Content Filtering
Answer: C
Explanation: Address restrictions allow the firewall to permit or deny traffic based on
specific IP addresses or address ranges.
Answer: B
Explanation: Static packet filtering doesn't keep a record of ongoing connections, which
can lead to vulnerabilities as it lacks the context of the connection.
74. A firewall that can consider the context of a connection and adjust its rules accordingly is
using:
A) State Table
D) Address Restrictions
Answer: C
Explanation: Dynamic packet filtering can adjust its filtering rules based on the context
or other observed traffic patterns.
75. Which is a primary advantage of stateful packet inspection over static packet filtering?
Answer: B
76. If a firewall only allows incoming traffic if it corresponds to a request sent from inside the
network, it's likely using:
A) Address Restrictions
Answer: D
Explanation: Stateful packet inspection uses a state table to ensure that incoming traffic
corresponds to an established session or a request sent from inside the network.
77. Which type of firewall only looks at packet headers and not the actual data payload?
D) Proxy Firewall
Answer: C
Explanation: Packet Filtering Firewalls evaluate packets based on their headers (source and
destination IP addresses, port numbers, etc.) without inspecting the data payload.
A) DoS attacks.
B) SQL injection.
D) Man-in-the-middle attacks.
Answer: C
Explanation: Address restrictions allow the firewall to block traffic from specific IP addresses or
ranges, making it effective against known malicious sources.
79. A firewall that evaluates packets based on both its pre-defined rules and the state of the
connection is known as:
Answer: B
Explanation: A Stateful Packet Inspection Firewall evaluates packets based on pre-defined rules
and maintains a state table to consider the context of the connection.
Answer: B
Explanation: State tables are used by firewalls to keep track of active connections, ensuring that
packets belong to an established session.
81. Which of the following firewall types operates without maintaining a record of active
connections?
D) Proxy Firewall
Answer: C
Explanation: Static Packet Filtering Firewalls make decisions based on fixed rules without
maintaining any record of active connections.
82. Which mode of VPN operation only encrypts the data payload and not the header?
A) Tunnel Mode
B) Transport Mode
C) Hybrid Mode
D) Secure Mode
Answer: B
Explanation: Transport Mode only encrypts the data payload of the packet, leaving the
original IP header exposed.
83. In which VPN mode is a new IP header added to the original packet?
A) Transport Mode
B) Bridge Mode
C) Tunnel Mode
D) Secure Mode
Answer: C
Explanation: Tunnel Mode encapsulates the entire original packet (header and payload)
and adds a new IP header, essentially "tunneling" the original packet within a new one.
84. Which of the following is typically used for end-to-end communications between individual
devices in VPN setups?
A) Tunnel Mode
B) Transport Mode
C) Secure Mode
D) Gateway Mode
Answer: B
85. Which mode is commonly used in VPN configurations that connect entire networks to each
other?
A) Bridge Mode
B) Gateway Mode
C) Transport Mode
D) Tunnel Mode
Answer: D
86. In IPsec VPNs, which mode can be used with NAT (Network Address Translation) without
issues?
A) Transport Mode
B) Tunnel Mode
C) Secure Mode
D) NAT Mode
Answer: B
Explanation: Tunnel Mode can be used with NAT because the original IP header is
encapsulated, and a new IP header is added. This allows NAT to function without
interfering with the secured data.
87. Which VPN technology does not inherently support multi-protocol operations?
A) MPLS
B) PPTP
C) L2TP
D) SSL VPN
Answer: B
Answer: C
Explanation: The main purpose of a VPN in a business context is to ensure secure and
encrypted communications over the potentially insecure internet.
89. Which protocol is combined with IPsec to provide VPN functionalities over non-IP networks?
A) MPLS
B) SSL
C) L2TP
D) HTTPS
Answer: C
Explanation: L2TP (Layer 2 Tunneling Protocol) is often combined with IPsec to provide
VPN functionalities over non-IP networks.
90. Which VPN mode is more CPU intensive due to the need for additional encapsulation?
A) Transport Mode
B) Tunnel Mode
C) Secure Mode
D) Bridge Mode
Answer: B
Explanation: Tunnel Mode requires the encapsulation of the entire original packet and
the addition of a new IP header, making it more CPU intensive compared to Transport
Mode.
91. If only the data payload of a packet needs to be encrypted and secured, which VPN mode is
appropriate?
A) Bridge Mode
B) Tunnel Mode
C) Transport Mode
D) Secure Mode
Answer: C
Explanation: Transport Mode encrypts and secures only the data payload of a packet, leaving
the header exposed, making it suitable for this scenario.
92. Which protocol is historically associated with centralized authentication for remote access?
A) SNMP
B) RADIUS
C) OSPF
D) BGP
Answer: B
93. Which protocol is considered an improvement over RADIUS and provides enhanced support
for network access control?
A) Diameter
B) TACACS+
C) LDAP
D) SSH
Answer: A
94. Which authentication protocol uses TCP as its transport protocol by default?
A) RADIUS
B) Diameter
C) TACACS+
D) SNMP
Answer: C
Explanation: TACACS+ (Terminal Access Controller Access-Control System Plus) uses TCP
as its default transport protocol, while RADIUS typically uses UDP.
A) RADIUS
B) LDAP
C) TACACS+
D) Diameter
Answer: C
A) OSPF
B) TACACS+
C) RADIUS
D) Diameter
Answer: A
Explanation: OSPF (Open Shortest Path First) is a routing protocol and not an
authentication protocol.
97. Which protocol was specifically designed to provide authentication in ISP environments?
A) Diameter
B) SNMP
C) TACACS
D) SSH
Answer: A
98. In terms of security, which protocol encrypts the entire authentication packet?
A) RADIUS
B) Diameter
C) TACACS+
D) SMTP
Answer: C
Explanation: TACACS+ encrypts the entire authentication packet, while RADIUS only
encrypts the password within the packet.
99. Which protocol has an extensible architecture that can support new command codes and
attributes without affecting existing commands?
A) SSH
B) RADIUS
C) TACACS+
D) Diameter
Answer: D
Explanation: Diameter has an extensible architecture that allows the addition of new
command codes and attributes without affecting existing commands, providing
flexibility.
100. Which of the following protocols uses UDP as its transport protocol by default?
A) SNMP
B) TACACS+
C) Diameter
D) RADIUS
Answer: D
Explanation: RADIUS uses UDP (User Datagram Protocol) as its default transport
protocol.