Home
1.
Which of the following best describes the difference between authentication and authorization?
  • A.
    There is no difference between authentication and authorization.
  • B.
    Authorization determines what a user may do, whereas an authentication determines what devices the user can interact with.
  • C.
    Authentication is used with both network access and device administration, whereas authorization applies only to device administration.
  • D.
    Authentication validates the user ’s identity, whereas authorization determines what that user is permitted to do.
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Simply put, authentication is the validation of the identity credentials. Authorization is the determination of what is allowed or disallowed based on those credentials.
Report
Name Email  
2.
Which of the following are types of AAA as related to the topics of this exam? (Select two.)
  • A.
    Device administration
  • B.
    Device access
  • C.
    A division of minor league baseball
  • D.
    Network access
  • E.
    Network administration
  • Answer & Explanation
  • Report
Answer : [A],[D]
Explanation :
The two forms of authentication, authorization, and accounting that are relevant to the SISAS exam are network access and device administration.
Report
Name Email  
3.
Which of the following protocols is best suited for granular command-level control with device administration AAA?
  • A.
    DIAMETER
  • B.
    TACACS+
  • C.
    RADIUS
  • D.
    RADIUS+
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
TACACS+ is best suited for granular command-level control due to its ability to separate authentication and authorization.
Report
Name Email  
4.
Which of the following protocols is best suited for authenticating and authorizing a user for network access AAA?
  • A.
    TACACS+
  • B.
    CHAP
  • C.
    RADIUS
  • D.
    MS-CHAPv2
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
RADIUS is best suited for network access AAA due to its capability to work with numerous authentication protocols, such as CHAP and MS-CHAPv2, but more importantly the dependency on RADIUS for 802.1X authenticationsand the enhancements to RADIUS for change of authorization.
Report
Name Email  
5.
True or False? RADIUS can be used for device administration AAA.
  • A.
    True
  • B.
    False
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Both TACACS+ and RADIUS can be used to provide device administration AAA services; however, TACACS+ offers command-level authorization and RADIUS does not.
Report
Name Email