Access Control and Identity Management Flashcards
Most of your client’s sales force have been told that they should no longer report to the office
on a daily basis. From now on, they’re to spend the majority of their time on the road calling
on customers. Each member of the sales force has been issued a laptop computer and told to
connect to the network nightly through a remote connection. Which of the following protocols
is widely used today as a transport protocol for remote Internet connections?
A. SMTP
B. PPP
C. PPTP
D. L2TP
B. PPP can pass multiple protocols and is widely used today as a transport protocol for
remote connections
Which protocol is unsuitable for WAN VPN connections?
A. PPP
B. PPTP
C. L2TP
D. IPSec
A. PPP provides no security, and all activities are unsecure. PPP is primarily intended for
remote connections and should never be used for VPN connections.
You’ve been given notice that you’ll soon be transferred to another site. Before you leave,
you’re to audit the network and document everything in use and the reason why it’s in use.
The next administrator will use this documentation to keep the network running. Which
of the following protocols isn’t a tunneling protocol but is probably used at your site by
tunneling protocols for network security?
A. IPSec
B. PPTP
C. L2TP
D. L2F
A. IPSec provides network security for tunneling protocols. IPSec can be used with many
different protocols besides TCP/IP, and it has two modes of security.
The present method of requiring access to be strictly defined on every object is proving too
cumbersome for your environment. The edict has come down from upper management that
access requirements should be reduced slightly. Which access model allows users some flexibility
for information-sharing purposes?
A. DAC
B. MAC
C. RBAC
D. MLAC
A. DAC allows some flexibility in information-sharing capabilities within the network.
A newly hired junior administrator will assume your position temporarily while you attend
a conference. You’re trying to explain the basics of security to her in as short a period of
time as possible. Which of the following best describes an ACL?
A. ACLs provide individual access control to resources.
B. ACLs aren’t used in modern systems.
C. The ACL process is dynamic in nature.
D. ACLs are used to authenticate users.
A. Access control lists allow individual and highly controllable access to resources in a network.
An ACL can also be used to exclude a particular system, IP address, or user.
LDAP is an example of which of the following?
A. Directory access protocol
B. IDS
C. Tiered model application development environment
D. File server
A. Lightweight Directory Access Protocol (LDAP) is a directory access protocol used to
publish information about users. This is the computer equivalent of a phone book.
Upper management has suddenly become concerned about security. As the senior network
administrator, you are asked to suggest changes that should be implemented. Which of the
following access methods should you recommend if the method is to be one that is primarily
based on preestablished access and can’t be changed by users?
A. MAC
B. DAC
C. RBAC
D. Kerberos
A. Mandatory Access Control (MAC) is oriented toward preestablished access. This access
is typically established by network administrators and can’t be changed by users.
Your office administrator is being trained to perform server backups. Which authentication
method would be ideal for this situation?
A. MAC
B. DAC
C. RBAC
D. Security tokens
C. Role-Based Access Control (RBAC) allows specific people to be assigned to specific roles
with specific privileges. A backup operator would need administrative privileges to back
up a server. This privilege would be limited to the role and wouldn’t be present during the
employee’s normal job functions.
You’ve been assigned to mentor a junior administrator and bring him up to speed quickly.
The topic you’re currently explaining is authentication. Which method uses a KDC to
accomplish authentication for users, programs, or systems?
A. CHAP
B. Kerberos
C. Biometrics
D. Smart cards
B. Kerberos uses a key distribution center (KDC) to authenticate a principal. The KDC
provides a credential that can be used by all Kerberos-enabled servers and applications
After a careful risk analysis, the value of your company’s data has been increased. Accordingly,
you’re expected to implement authentication solutions that reflect the increased value
of the data. Which of the following authentication methods uses more than one authentication
process for a logon?
A. Multifactor
B. Biometrics
C. Smart card
D. Kerberos
A. A multifactor authentication method uses two or more processes for logon. A two-factor
method might use smart cards and biometrics for logon.
You’re the administrator for Mercury Technical. Due to several expansions, the network has
grown exponentially in size within the past two years. Which of the following is a popular
method for breaking a network into smaller private networks that can coexist on the same
wiring and yet be unaware of each other?
A. VLAN
B. NAT
C. MAC
D. Security zone
A. Virtual local area networks (VLANs) break a large network into smaller networks.
These networks can coexist on the same wiring and be unaware of each other. A router
or other routing-type device would be needed to connect these VLANs.
Which technology allows a connection to be made between two networks using a
secure protocol?
A. Tunneling
B. VLAN
C. Internet
D. Extranet
A. Tunneling allows a network to make a secure connection to another network through the
Internet or other network. Tunnels are usually secure and present themselves as extensions
of both networks.
Your company provides medical data to doctors from a worldwide database. Because of the
sensitive nature of the data you work with, it’s imperative that authentication be established
on each session and be valid only for that session. Which of the following authentication
methods provides credentials that are valid only during a single session?
A. Tokens
B. Certificate
C. Smart card
D. Kerberos
A. Tokens are created when a user or system successfully authenticates. The token is
destroyed when the session is over.
Which of the following is the term used whenever two or more parties authenticate
each other?
A. SSO
B. Multifactor authentication
C. Mutual authentication
D. Tunneling
C. Whenever two or more parties authenticate each other, this is known as
mutual authentication.
Which of the following security areas encompasses network access control (NAC)?
A. Physical security
B. Operational security
C. Management security
D. Triad security
B. Operational security issues include network access control (NAC), authentication, and
security topologies after the network installation is complete.