Review Questions - SYS701 - 8 - Identity and Access Management
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Angela has chosen to federate with other organizations to allow use of services that each organization provides. What role does Angela's organization play when they authenticate their users and assert that those users are valid to other members of the federation?

  • Service provider (correct)
  • Relying party
  • Authentication provider
  • Identity provider (correct)

Which of the following technologies is the least effective means of preventing shared accounts?

  • Requiring biometric authentication
  • Requiring one-time passwords via a token
  • Requiring a one-time password via an application
  • Password complexity requirements (correct)

What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment?

  • A.Account policy control will be set to the cloud provider's standards.
  • B.The cloud service will provide account and identity management services. (correct)
  • C.Multifactor authentication will not be supported by the cloud vendor.
  • D.None of the above.

Amitoj wants to ensure that her organization's password policy does not allow users to reset their password multiple times until they can reuse their current password. What setting is used to prevent this?

<p>Age (D)</p> Signup and view all the answers

Which type of multifactor authentication is considered the least secure?

<p>SMS (B)</p> Signup and view all the answers

Geeta has been issued a USB security key as part of her organization's multifactor implementation. What type of implementation is this?

<p>A biometric token (A)</p> Signup and view all the answers

Michelle enables the Windows picture password feature to control logins for her laptop. Which type of attribute will it provide?

<p>Something you know (B)</p> Signup and view all the answers

What purpose would Linux file permissions set to rw-r—r-- serve?

<p>To allow the owner to read and write the file, and for the owner's group and others to be able to read it (A)</p> Signup and view all the answers

Theresa wants to implement an access control scheme that sets permissions based on what the individual's job requires. Which of the following schemes is most suited to this type of implementation?

<p>RBAC (C)</p> Signup and view all the answers

Which of the following biometric technologies is most broadly deployed due to its ease of use and acceptance from end users?

<p>Fingerprint scanner (D)</p> Signup and view all the answers

Adam want to increase his organization's passwords resistance to attacks in the event that the password hash database is stolen by attackers. Which of the following password security settings has the largest impact on password cracking if his organization's current passwords are 8 characters long?

<p>Password length (B)</p> Signup and view all the answers

A PIN is an example of what type of factor?

<p>Something you know (A)</p> Signup and view all the answers

Marie is implementing a PAM solution and wants to ensure that root passwords are available in the event of an outage. Which PAM-related tool is most likely to be useful in this situation?

<p>Password vaulting (C)</p> Signup and view all the answers

Jill sets her files on a Windows file share to allow Fred to access the files. What type of access control system is she using?

<p>Discretionary access control (D)</p> Signup and view all the answers

Lisa sets up an account on a website that allows her to log in with Google. When she logs in, Google provides an access token to the website that confirms that she is who she says she is but doesn't provide the site with her password. Which of the following technologies has she used?

<p>OAuth (B)</p> Signup and view all the answers

Kyle has been asked to provide his government-issued ID as part of the creation of his user account. What process should he assume it is being used for?

<p>Identity proofing (C)</p> Signup and view all the answers

What key concept below best describes only providing the permissions necessary to perform a role?

<p>Least privilege (A)</p> Signup and view all the answers

Nina has recently left her organization. What should the organization do with her account?

<p>Deprovision her account. (C)</p> Signup and view all the answers

A person's name, age, location, or job title are all examples of what?

<p>Attributes (C)</p> Signup and view all the answers

What type of access control scheme best describes the Linux filesystem?

<p>DAC (C)</p> Signup and view all the answers

Flashcards

Capital of France (example flashcard)

Paris

More Like This

Use Quizgecko on...
Browser
Browser