Home > Articles > Access Management

Access Management

Chapter Description

In this sample chapter from Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide, you will learn how to provide an access management solution using the AAA framework, which outlines the best practices you need to consider when it comes to authentication, authorization, and accounting. This chapter covers CCST exam objective 1.3.

Review Questions

  1. What does AAA stand for?

    1. Authentication, accessibility, and availability

    2. Availability, authentication, and authorization

    3. Authentication, authorization, and accounting

    4. Authentication, availability, and accounting

  2. Which of the following are examples of MFA? (Choose two.)

    1. A USB authentication key that needs to be connected to the USB port on the system and a notification displayed on your phone that needs to be accepted or rejected

    2. A bank card and a memorized PIN

    3. A fingerprint scan followed by a facial scan

    4. A username/password and a four-digit PIN that you have memorized

    5. A username/password and a notification sent to your phone that requires you to click yes or no

  3. Which of the following are authorization principles? (Choose three.)

    1. Enable MFA

    2. Least privilege

    3. Need to know

    4. Implicit deny

    5. Record all activity

  4. Which of the following is a system that can help you collect logs, consolidate logs, correlate logs, and get notified about abnormalities and threats in logs that are in breach of established policies.

    1. SIEM

    2. SOAR

    3. RADIUS

    4. MFA

  5. What port numbers are typically used with RADIUS?

    1. 20 and 21

    2. 22 and 23

    3. 1812 and 1813

    4. 3388 and 3389

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.