Search Header Logo

CBK Domain 5 - Identity and Access Management.

Authored by IIMXX IIMXX

Computers

University

132 Questions

CBK Domain 5 - Identity and Access Management.
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which type of access control model would we use if availability is MOST important?

Rule-Based Access Control (RBAC)

Role-Based Access Control (RBAC)

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Looking at identity and access provisioning, identities consist of which of these?

Objects

Rights

Attributes

Entities

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A disgruntled former employee is trying to break the passwords of our administrator accounts using rainbow tables.

What is he using for that?

He uses full words often with numbers at the end.

He has software installed on a computer that records all keystrokes.

He has software installed on a computer that records all keystrokes.

He uses precompiled hashes to compare the password hash to.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of these protocols is vendor-neutral?

AD

LDAP

VTP

EIGRP

Answer explanation

LDAP (The Lightweight Directory Access Protocol): Open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an IP network. Application layer protocol and use TCP and UDP port 389. LDAP is commonly used for central usernames and passwords storage, many different applications and services can connect to the LDAP server to validate users.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of these authentication protocols is no longer considered secure?

Diameter

Radius

TACACS+.

TACACS

Answer explanation

TACACS (The Terminal Access Controller Access Control System): Centralized access control system requiring users to send an ID and reusable (vulnerable) passwords for authentication, because of this it is no longer considered secure. Uses TCP/UDP port 49. TACACS has generally been replaced by TACACS+ and RADIUS.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Jane has been tasked with implementing multifactor authentication at our organization. The request from senior management is to make it secure, but also to protect employees' privacy and not inadvertently record something that could reveal private employee health information. To make passwords safer Jane implements some safeguards.

Which of these should NOT be one of them?

Key stretching.

No minimum password age.

Salting

Nonce

Answer explanation

We could use nonces, salting and key stretching as well as minimum password age. Nonce is arbitrary number that may only be used once. Salting is random data that is used as an additional input to a one-way function that hashes a password or passphrase. Key stretching – Adding 1-2 seconds to password verification. If an attacker is brute forcing password and need millions of attempts it will become an unfeasible attack. Minimum password age is used to prevent users from cycling through passwords to return to their favorite password again.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

We are using DAC (Discretionary Access Control) in our organization.

What is DAC based on?

The job role of the user.

The discretion of the object owner.

IF/THEN statements.

Labels and clearance.

Answer explanation

DAC (Discretionary Access Control): Often used when Availability is most important. Access to an object is assigned at the discretion of the object owner. The owner can add, remove rights, commonly used by most OS’. Uses DACL’s (Discretionary ACL), based on user identity.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?