
CBK Domain 5 - Identity and Access Management.
Authored by IIMXX IIMXX
Computers
University
132 Questions

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which type of access control model would we use if availability is MOST important?
Rule-Based Access Control (RBAC)
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Looking at identity and access provisioning, identities consist of which of these?
Objects
Rights
Attributes
Entities
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A disgruntled former employee is trying to break the passwords of our administrator accounts using rainbow tables.
What is he using for that?
He uses full words often with numbers at the end.
He has software installed on a computer that records all keystrokes.
He has software installed on a computer that records all keystrokes.
He uses precompiled hashes to compare the password hash to.
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of these protocols is vendor-neutral?
AD
LDAP
VTP
EIGRP
Answer explanation
LDAP (The Lightweight Directory Access Protocol): Open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an IP network. Application layer protocol and use TCP and UDP port 389. LDAP is commonly used for central usernames and passwords storage, many different applications and services can connect to the LDAP server to validate users.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of these authentication protocols is no longer considered secure?
Diameter
Radius
TACACS+.
TACACS
Answer explanation
TACACS (The Terminal Access Controller Access Control System): Centralized access control system requiring users to send an ID and reusable (vulnerable) passwords for authentication, because of this it is no longer considered secure. Uses TCP/UDP port 49. TACACS has generally been replaced by TACACS+ and RADIUS.
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Jane has been tasked with implementing multifactor authentication at our organization. The request from senior management is to make it secure, but also to protect employees' privacy and not inadvertently record something that could reveal private employee health information. To make passwords safer Jane implements some safeguards.
Which of these should NOT be one of them?
Key stretching.
No minimum password age.
Salting
Nonce
Answer explanation
We could use nonces, salting and key stretching as well as minimum password age. Nonce is arbitrary number that may only be used once. Salting is random data that is used as an additional input to a one-way function that hashes a password or passphrase. Key stretching – Adding 1-2 seconds to password verification. If an attacker is brute forcing password and need millions of attempts it will become an unfeasible attack. Minimum password age is used to prevent users from cycling through passwords to return to their favorite password again.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
We are using DAC (Discretionary Access Control) in our organization.
What is DAC based on?
The job role of the user.
The discretion of the object owner.
IF/THEN statements.
Labels and clearance.
Answer explanation
DAC (Discretionary Access Control): Often used when Availability is most important. Access to an object is assigned at the discretion of the object owner. The owner can add, remove rights, commonly used by most OS’. Uses DACL’s (Discretionary ACL), based on user identity.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
136 questions
A-Chương 1
Quiz
•
University
130 questions
FINALS AISPRE5
Quiz
•
University
135 questions
Analisis Algoritma
Quiz
•
University
128 questions
Modul 1: Basic IT Concepts - Hardware & Peripherals
Quiz
•
University
135 questions
UML and Software Engineering Quiz
Quiz
•
University
131 questions
Software Testing Udacity cs258 Unit 1
Quiz
•
University
129 questions
Ôn Tập Microsoft Excel
Quiz
•
University
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
20 questions
christmas songs
Quiz
•
KG - University
20 questions
Holiday Trivia
Quiz
•
9th Grade - University
15 questions
Holiday Movies
Quiz
•
University
14 questions
Christmas Trivia
Quiz
•
3rd Grade - University
20 questions
Christmas Trivia
Quiz
•
University
8 questions
5th, Unit 4, Lesson 8
Lesson
•
KG - Professional Dev...
20 questions
Disney Trivia
Quiz
•
University