Authentication and Identity Management Flashcards

1
Q

You must set up a secure authentication and encryption method for your remote users. Most users are remote salespeople who connect to the company’s networks from home networks or hotel Internet connections. Which of the following methods would you use?

802.1X

VPN

Kerberos

A

VPN

The VPN can encrypt your communications while providing authentication to an authentication server. This is especially important for users connecting remotely over the Internet from insecure locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are tasked with creating a high-security authentication system for physical access control to a military installation. Which of the following authentication systems would be most appropriate?

Biometric eye scan

Security badge

Smart card and PIN

A

Biometric eye scan

For high-security installations, biometrics is an extremely secure method to authenticate users based on unique physical characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are setting up an LDAP server that will provide secure, encrypted authentication services. Which of the following protocols and ports do you use?

LDAP on TCP port 689

LDAPS on TCP port 389

LDAPS on TCP port 689

A

LDAPS on TCP port 689

When you use LDAPS (which uses TCP port 689), the authentication takes place over an encrypted channel to prevent the capture of authentication credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are at home and have received a call from your office that one of your mail servers is down. You have set up a secure, encrypted remote access method to an administrative computer at your office. Which of the following remote access methods do you use?

Dial-up

Telnet

VPN

A

VPN

The VPN method provides a secure, encrypted channel over the Internet to your organization’s private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have several home users with Internet access who require remote access to your organization’s network. Which of the following remote access and authentication technologies would be the most secure?

Dial-up access to a Kerberos server

A VPN authenticated to a RADIUS server

Telnet access to a local password database

A

A VPN authenticated to a RADIUS server

By using a VPN to a RADIUS server, you ensure that your communications are encrypted and that secure authentication takes place to the RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A web services provider has suggested improving their security through the implementation of two-factor authentication. What would be the most likely authentication method?

TOTP

SAML

ISDN

A

TOTP

Time-based One-time Passwords (TOTPs) allow users to log in to a system with a username and password combination and then a one-time token, usually generated from a separate device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are creating an authentication mechanism for physical access to a high-security government building. The high-security nature of the facility requires at least a three-factor authentication model. Which of the authentication types do you use?

Biometric eye scan

Smart card and PIN

Smart card, PIN, and fingerprint scan

A

Smart card, PIN, and fingerprint scan

For a three-factor authentication model, you need at least three different types of authentication. A biometric eye scan, although extremely secure, is still only a one-factor system, while the other methods (such as a smart card and a PIN) are only two-factor systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

After a user is identified and authenticated to the system, what else must be performed to enable the user to use a resource?

Authorization

Authentication by token

Encryption of network access

A

Authorization

Although a user has been given access to log in to the network, he still needs to be authorized to use a particular resource based on access permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SAML implementations have three basic roles: the identity, the identity provider, and the ___________.

Internet provider

service provider

authentication provider

A

service provider

The service provider takes the token passed from the identity provider and either accepts and provides services to the user or denies the request and does not provide the services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are setting up a single sign-on authentication system for a large enterprise network of 5000 users. Which of the following authentication methods would you use?

Local login and password database

Login and password with a security token

LDAP server

A

LDAP server

An LDAP server provides a centralized authentication database that can be used to securely authenticate a user to multiple services on the same network. This is the most efficient and secure method for a large network of 5000 users. Other methods would require tedious configuration and management of each individual user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly