answersLogoWhite

0


Best Answer

For this purpose a standardization body IETF is present. there you can find number of RFCs for authentication techniques and methods. you can also checkout ietf.org

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which standard is used to authenticate users before they gain access to a network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What type of ACL can be used to force a use to authenticate to the router before acces a network?

Dynamic


What type of ACL can be used to force a user to authenticate to the router before accessing a network?

Dynamic ACL


Which authentication model is used to ensure that both client and server authenticate each other before allowing access?

Mutual Authentication


Why Ethernet network adapter used in laptops?

So they can be connected to a network. If you visit a place which does not have Wi-Fi access, then you can plug it into a Cat 5 socket. Before Wi-Fi was as popular as it is now, most motels which offered internet access had Cat 5 network sockets so guests could get Internet access.


What type of access method are used when network devices listen to the cable before transmitting?

CSMA/CD (Carrier Sense Multiple Access / Collision Detect)


Organize your access list so that x references in a network or subnet appear before y references?

x -> specific y -> general


Which networking device is typically used to concentrate the dial-in and dial-out traffic of multiple users to and from a network?

The answer is " access server " . ( source - done this question before )


Is it okay to do FAFSA on an unsecured network?

You should do a FAFSA on a secured network because of the private and sensitive information that is included on the FAFSA. You should look to see if you see "https" before the web address to make sure that it is secure. If you do not have access to a secure network, you can also print a paper application and mail it in.


How is it possible to get a hold of network protection?

In order for a network to be as secure as possible, the use of a static server is recommended as there is far less chance of unauthorized access. This is because every device on the network will need to know all associated IP addresses and security settings before it will be allowed to connect. Changing passwords regularly will also be a big help.


Advantages of a server based network?

A client-server network is commonly used for medium to large business networks. In this type of setup, a server manages the sharing of network resources. The computers in client-server network rely on one or more central management points to access shared network resources such as printers, scanners, folders and files. A client-server network is more appropriate for medium size to larger networks because delivery and access to resources are more easily managed from a central control point. Servers are designed to cope with many simultaneous connections from users that need to access resources at the same time. Security and access control is more easily managed with this type of network and is considered extremely important by most organizations. The network administrator that manages the server(s) decides on access rights for users. A user may be allowed access to some shared resources but denied access to others. Normally, a user must authenticate themselves to a server before accessing any resources. Administrators manage users by creating accounts for them. each with their own username and password. Managing user accounts from a central location is one of the advantages of this type of client-server networks. Moreover, when network users save their data to file servers, administrators can back up the data easily and regularly to another location. Relying on a single server would mean relying on a single central connection point and the entire network would grind to a halt if it failed. Many client-server networks use more than one server as an extra precaution against a server failing. Advantages * More scalable than peer-to-peer networks * There is a central management point for sharing resources * More easily administered due to the central management point * More secure than peer-to-peer networks * Data can be backed up from one central location JAWID RAIZBCAS -KANDY Campus


Before using a network monitor or protocol analyzer on a network it is important to know what on your network normally looks like?

Traffic.


Network switches always must be configured before they can be put into operation in a network?

true