Appendix A. Answers to the “Do I Know This Already?” Quizzes

Chapter 2

1. D. Simply put, authentication is the validation of the identity credentials. Authorization is the determination of what is allowed or disallowed based on those credentials.

2. A, D. The two forms of authentication, authorization, and accounting that are relevant to the SISAS exam are network access and device administration.

3. B. TACACS+ is best suited for granular command-level control due to its ability to separate authentication and authorization.

4. C. RADIUS is best suited for network access AAA due to its capability to work with numerous authentication protocols, such as CHAP and MS-CHAPv2, but more importantly the dependency on RADIUS for 802.1X authenticationsand ...

Get CCNP Security SISAS 300-208 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.