CompTIA Security+ Question G-97

The security administrator notices a user logging into a corporate Unix server remotely as root. Which of the following actions should the administrator take?

A. Create a firewall rule to block SSH
B. Delete the root account
C. Disable remote root logins
D. Ensure the root account has a strong password

Answer: C

Explanation:
Remote users log in to Unix or Linux servers by using SSH. Although SSH is secure, allowing remote access as root is a security risk.

One of the biggest security holes you could open on a Unix or Linux server is to allow directly logging in as root through SSH, because any cracker can attempt to brute force your root password and potentially get access to your system if they can figure out your password. It’s much better to have a separate account that you regularly use and simply sudo to root when necessary. You should disable root ssh access by editing /etc/ssh/sshd_config to contain: PermitRootLogin no

CompTIA Security+ Question E-82

Which of the following types of security services are used to support authentication for remote users and devices?

A. Biometrics
B. HSM
C. RADIUS
D. TACACS

Answer: C

Explanation:
RADIUS authentication phase takes place when a network client connects to a network access server (NAS) and provides authentication credentials. The NAS will then make use of the authentication credentials to issue a RADIUS authentication request to the RADIUS server, which will then exchange RADIUS authentication messages with the NAS.

CompTIA Network+ Question A-9

A technician needs to install a server to authenticate remote users before they have access to corporate network resources when working from home. Which of the following servers should the technician implement?

A. DNSSEC
B. PPP
C. RAS
D. VLAN
E. NAT

Correct Answer: C

CompTIA A+ Core 2 Question I-27

A company has decided that all remote users need to use two-factor authentication to increase security. Several remote users have reported losing the RSA token and have replaced it several times. Which of the following is the solution for these users?

A. Use biometrics instead of the RSA token.
B. Remove the RSA token requirement for any user that has lost an RSA token.
C. Give the users with lost RSA tokens RFID badges instead.
D. Attach the RSA token to the lid of the laptop.

Correct Answer: A