FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You have been asked to select the proper type of protocol to implement in order to grant access to remote users. The protocol should use separate and multiple challenges and responses for each of the authentication, authorization, and auditing functions. Which of the following should you select?
A
RADIUS
B
TACACS
C
LDAP
D
Active Directory
Explanation: 

Detailed explanation-1: -EAP-TLS (Transport Layer Security) EAP-TLS provides certificate-based, mutual authentication of the network and the client. Both the client and the server must have certificates to perform this authentication.

Detailed explanation-2: -PAP (Password Authentication Protocol) is a very weak authentication protocol. It sends the username and password in cleartext.

Detailed explanation-3: -802.1X protocol-An IEEE standard for port-based network access control (PNAC) on wired and wireless access points.

Detailed explanation-4: -Implement two-factor authentication (2FA) Two-factor authentication is probably the best way to improve the security of an authentication process. It is safe to say that a properly implemented 2FA method can help you prevent a severe vulnerability in the authentication process.

There is 1 question to complete.