www.howtonetwork.org

CCNA & CCNP Certifcation Training

  • About
  • Contact
  • FAQ
  • Join
  • Home
  • CCNA
    • ICND1
    • ICND2
    • 101 CCNA LABS
  • CCNP
    • ROUTE
    • SWITCH
    • TSHOOT
    • 101 CCNP LABS
  • CompTIA
    • Security+
    • Network+
  • Design
    • CCDA
    • CCDP
You are here: Home / CompTIA / Network+ / Section V: Network Security / Chapter 29: User Authentication / Chapter 29 Quiz

Chapter 29 Quiz

1. Which of the following algorithms can be used to generate a message digest (choose all that apply)?

a. Kerberos

b. MD5

c. 802.1X

d. EAP

e. SHA

 

2. The PKI (Public Key Infrastructure) is a complex authentication technique that functions using digital certificates (true or false).

a. True

b. False

 

3. Which of the following encryption types uses a different key for the encryption and decryption processes?

a. Symmetric

b. Extended

c. Asymmetric

d. None of the above

 

4. EAP-TLS (EAP-Transport Layer Security) is a commonly used EAP method in wireless environments that . . .

The content below this message is for members only.

About Us

This is a free bonus site for members of www.howtonetwork.com

Copyright

The content on this copyright Reality Press Ltd.
Copyright Reality Press Ltd.