CH.2 UNDERSTANDING IDENTITY AND ACCESS Flashcards

1
Q

Your organization wants to identify biometric methods used for identification. The requirements are:

  • Collect the data passively.
  • Bypass a formal enrollment process.
  • Avoid obvious methods that let the subject know data is being collected.

Which of the following biometric methods BEST meet these requirements? (Select TWO.)
A. Fingerprint
B. Retina
C. Iris
D. Facial
E. Palm vein
F. Gait analysis

A

D and F are correct. It’s possible to collect facial scan data and perform gait analysis without an enrollment process. You would use cameras to observe subjects from a distance and collect data passively. You need a formal enrollment process for fingerprints, retinas, irises, and palm vein methods. Retina and iris scans need to be very close to the eye and are very obvious. Palm vein methods require users to place their palm on a scanner. While it’s possible to collect fingerprints passively, you still need an enrollment process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your organization recently updated an online application employees use to log on when working from home. Employees enter their username and password into the application from their smartphone and the application logs their location using GPS. Which type of authentication is being used?
A. One-factor
B. Dual-factor
C. Something you are
D. Something you have

A

A is correct. This is using one-factor authentication—something you know. The application uses the username for identification and the password for authentication. Note that even though the application is logging the location using Global Positioning System (GPS), there isn’t any indication that it is using this information for authentication. Dual-factor authentication requires another factor of authentication such as something you are or something you have. The something you have factor referes to another source of information in your possession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Management within your organization wants to add 2FA security for users working from home. Additionally, management wants to ensure that 2FA passwords expire after 30 seconds. Which of the following choices BEST meets this requirement?
A. HOTP
B. TOTP
C. SMS
D. Kerberos

A

B is correct. A Time-based One-Time Password (TOTP) meets the requirement of two-factor authentication (2FA). A user logs on with regular credentials (such as a username and password), and then must enter an additional one-time password. Some smartphone apps use TOTP and display a refreshed password at set intervals, commonly every 30-240 seconds. An HMAC-based One-Time Password (HOTP) creates passwords that do not expire until they are used. Short message service (SMS) is sometimes used to send users a one-time use password via email or a messaging app, but these passwords typically don’t expire until at least 15 minutes later. Kerberos uses tickets instead of passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Management within your organization has decided to implement a biometric solution for authentication into the data center. They have stated that the biometric system needs to be highly accurate. Which of the following provides the BEST indication of accuracy with a biometric system?

A. The lowest possible FRR
B. The highest possible FAR
C. The lowest possible CER
D. The highest possible CER

A

C is correct. A lower crossover error rate (CER) indicates a more accurate biometric system. The false acceptance rate (FAR) and the false rejection rate (FRR) vary based on the sensitivity of the biometric system and don’t indicate accuracy by themselves. A higher CER indicates a less accurate biometric system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Marvin Monroe Memorial Hospital was recently sued after removing a kidney from the wrong patient. Hospital executives want to implement a method that will reduce medical errors related to misidentifying patients. They want to ensure medical personnel can identify a patient even if the patient is unconscious. Which of the following would be the BEST solution?
A. Gait analysis
B. Vein scans
C. Retina scan
D. Voice recognition

A

B is correct. A vein scan implemented with a palm scanner would be the best solution of the available choices. The patient would place their palm on the scanner for biometric identification, or if the patient is unconscious, medical personnel can place the patient’s palm on the scanner. None of the other biometric methods can be easily performed on an unconscious patient. Gait analysis attempts to identify someone based on the way they move. A retina scan scans the retina of an eye, but this will be difficult if someone is unconscious. Voice recognition identifies a person using speech recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Users regularly log on with a username and password. However, management wants to add a second authentication factor for any users who launch the gcga application. The method needs to be user-friendly and non-disruptive. Which of the following will BEST meet these requirements?
A. An authentication application
B. TPM
C. HSM
D. Push notifications

A

D is correct. Push notifications are user-friendly and non-disruptive. Users receive a notification on a smartphone or tablet and can often acknowledge it by simply pressing a button. An authentication application isn’t as user-friendly as a push notification. It requires users to log on to the smartphone, find the app, and enter the code. A Trusted Platform Module (TPM) can provide for the implementation of full disk encryption, which would protect the data if someone accessed the laptop, but it doesn’t prevent access. A hardware security module (HSM) is a removable device that can generate and store RSA keys used with servers. Neither a TPM nor an HSM is relevant in this question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your organization hires students during the summer for temporary help. They need access to network resources, but only during working hours. Management has stressed that it is critically important to safeguard trade secrets and other confidential information. Which of the following account management concepts would be MOST important to meet these goals?
A. Account expiration
B. Account lockout
C. Time-of-day restrictions
D. Password recovery
E. Password history

A

C is correct. Time-of-day restrictions should be implemented to ensure that temporary workers can only access network resources during work hours. The other answers represent good practices, but don’t address the need stated in the question that “personnel need access to network resources, but only during working hours.” Account expiration should be implemented if the organization knows the last workday of these workers. Account lockout will lock out an account if the wrong password is entered too many times. Password recovery allows users to recover a forgotten password or change their password if they forgot their password. Password history remembers previously used passwords and helps prevent users from using the same password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You need to provide a junior administrator with appropriate credentials to rebuild a domain controller after it suffers a catastrophic failure. Of the following choices, what type of account would BEST meet this need?
A. User account
B. Generic account
C. Guest account
D. Service account

A

A is correct. A user account is the best choice of the available answers. More specifically, it would be a user account with administrative privileges (also known as a privileged account) so that the administrator can add the domain controller. A generic account (also known as a shared account) is shared between two or more users and is not recommended. A guest account is disabled by default and it is not appropriate to grant the guest account administrative privileges. A service account is an account created to be used by a service or application, not a person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lisa is reviewing an organization’s account management processes. She wants to ensure that security log entries accurately report the identity of personnel taking specific actions. Which of the following steps would BEST meet this requirement?
A. Implement generic accounts.
B. Implement role-based privileges.
C. Use an SSO solution.
D. Remove all shared accounts.

A

D is correct. Removing all shared accounts is the best answer of the available choices. If two employees are using the same account, and one employee maliciously deletes data in a database, it isn’t possible to identify which employee deleted the data. Generic accounts are the same as shared accounts and shouldn’t be used. Role-based (or group-based) privileges assign the same permissions to all members of a group, which simplifies administration. A single sign-on (SSO) solution allows a user to log on once and access multiple resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A recent security audit discovered several apparently dormant user accounts. Although users could log on to the accounts, no one had logged on to them for more than 60 days. You later discovered that these accounts are for contractors who work approximately one week every quarter. Which of the following is the BEST response to this situation?
A. Remove the account expiration from the accounts.
B. Delete the accounts.
C. Reset the accounts.
D. Disable the accounts.

A

D is correct. The best response is to disable the accounts and then enable them when needed by the contractors. Ideally, the accounts would include an expiration date so that they would automatically expire when no longer needed, but the scenario doesn’t indicate the accounts have an expiration date. Because the contractors need to access the accounts periodically, it’s better to disable them rather than delete them. Resetting the accounts implies you are changing the password, but this isn’t needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A software developer is creating an application that must access files stored in the user’s Google Drive. What is the best way for the user to grant the application access to their Google account?
A. OpenID Connect
B. Provide their Google password each time they log into the application
C. OAuth
D. Store their Google password in the application

A

C is correct. The OAuth authorization protocol is explicitly designed for this type of situation. Users of the application can grant the application limited access to resources in their Google account without disclosing their credentials. This protects the security of their account and limits the access granted to the application. If the user discloses their password to the application, this allows the application full access to their account. OpenID Connect is used to log into one service with credentials from another service and does not provide the type of authorization required in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Artie has been working at Ziffcorp as an accountant. However, after a disagreement with his boss, he decides to leave the company and gives a two-week notice. He has a user account allowing him to access network resources. Which of the following is the MOST appropriate step to take?
A. Ensure his account is disabled when he announces that he will be leaving the company.
B. Immediately terminate his employment.
C. Force him to take a mandatory vacation.
D. Ensure his account is disabled during his exit interview.

A

D is correct. His account should be disabled during the exit interview. It’s appropriate to conduct an exit interview immediately before an employee departs. Employees often give a two-week or longer notice. If their access is revoked immediately, they won’t be able to do any more work. While some companies do terminate employment when someone gives notice, from a security perspective, that doesn’t address the needed action related to the user account. The purpose of a mandatory vacation is to detect fraud, but if the employee is leaving, any potential fraud will be detected when that employee leaves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web developers in your organization are creating a web application that will interact with other applications running on the Internet. They want their application to receive user credentials from an app running on a trusted partner’s web domain. Which of the following is the BEST choice to meet this need?

A. SSO
B. SAML
C. Kerberos
D. RADIUS

A

The best choice to meet this need is B. SAML.

SAML (Security Assertion Markup Language) is specifically designed for exchanging authentication and authorization data between different domains, making it ideal for scenarios where a web application needs to interact with another trusted partner’s web domain and receive user credentials. It enables secure, web-based Single Sign-On (SSO) across different organizations or domains.

All SSO solutions are not used on the Internet, so SSO isn’t the best answer. Kerberos is an SSO solution used on internal networks such as in Microsoft Active Directory domains and Unix realms. Remote Authentication Dial-In User Service (RADIUS) provides authentication, authorization, and accounting (AAA) services for some remote access, wired, and wireless network solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You administer access control for users in your organization. Some departments have a high employee turnover, so you want to simplify account administration. Which of the following is the BEST choice?
A. User-assigned privileges
B. Group-based privileges
C. Domain-assigned privileges
D. Network-assigned privileges

A

B is correct. Group-based privileges are a form of role-based access control and they simplify administration. Instead of assigning permissions to new employees individually, you can just add new employee user accounts into the appropriate groups to grant them the rights and permissions they need for the job. User- assigned privileges require you to manage privileges for each user separately, and they increase the account administration burden. Domain-assigned and network-assigned privileges are not valid administration practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An administrator needs to grant users access to different shares on file servers based on their job functions. Which of the following access control schemes would BEST meet this need?
A. Discretionary access control
B. Mandatory access control
C. Role-based access control
D. Rule-based access control

A

C is correct. The role-based access control (role-BAC) scheme is the best choice for assigning access based on job functions. A discretionary access control (DAC) scheme specifies that every object has an owner and owners have full control over objects, but it isn’t related to job functions. A mandatory access control (MAC) scheme uses labels and a lattice to grant access rather than job functions. A rule-based access control (rule- BAC) scheme uses rules that trigger in response to events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your organization is implementing a new authentication system to enhance security. The system should use two-factor authentication, where users authenticate with a smart card and a PIN. However, management wants to ensure that the system can also detect unauthorized access attempts based on the user’s location.

Which of the following authentication methods should the organization use to meet these requirements? (Select TWO.)

A. Biometrics
B. Something you know
C. Geolocation
D. Smart card
E. Retina scan

A

B and C are correct. The organization requires two-factor authentication, where a smart card (something you have) is paired with a PIN (something you know). The additional requirement for detecting access based on location can be achieved through geolocation. Biometrics and retina scans are not relevant in this scenario because they don’t meet the stated requirement of location detection, and the smart card already satisfies the “something you have” factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Your organization is implementing multi-factor authentication (MFA) for all remote workers. The MFA must include something you know and something you have. In addition, the system should automatically invalidate any authentication tokens after 30 seconds.

Which of the following options BEST meets these requirements? (Select TWO.)

A. HOTP
B. TOTP
C. Smart card
D. SMS
E. Password

A

B and E are correct. TOTP generates time-based one-time passwords that expire after 30 seconds, meeting the requirement for automatic invalidation. A password (something you know) combined with TOTP (something you have) provides the necessary multi-factor authentication. HOTP tokens do not expire until used, and SMS does not meet the time-based expiration requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An organization has implemented biometric authentication for entry into a data center. The chosen biometric method needs to minimize user frustration and provide a balance between security and user convenience. However, the system must also be able to adjust sensitivity to minimize false rejections.

Which of the following biometric methods BEST meets these requirements?

A. Fingerprint scan
B. Iris scan
C. Facial recognition
D. Gait analysis

A

A. Fingerprint scan is correct.

Fingerprint scanning provides a good balance of security and user convenience. It is relatively quick, easy to use, and less intrusive compared to other biometric methods like iris scans. Additionally, fingerprint systems can adjust sensitivity to reduce false rejection rates (FRR), improving the user experience while maintaining security.

Other methods, like iris scans, tend to be more intrusive and inconvenient, and facial recognition can be affected by environmental factors, while gait analysis is less common and can be less reliable in terms of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your company is setting up access controls for a new project management server. Project managers need full access to the server, while team members only need to update tasks. Executives should only have view access to the data.

Which access control model is BEST suited to meet these requirements?

A. Mandatory access control (MAC)
B. Role-based access control (RBAC)
C. Discretionary access control (DAC)
D. Attribute-based access control (ABAC)

A

B is correct. Role-based access control (RBAC) assigns permissions based on job roles, such as project manager, team member, or executive. This model best suits the scenario where permissions are aligned with specific job functions.

A. Mandatory Access Control (MAC):
MAC is a highly restrictive model where access is controlled by a central authority based on security classifications.

C. Discretionary Access Control (DAC):
This model isn’t well-suited for enforcing company-wide roles and permissions, as it gives individual users more control over access rights.

D. Attribute-Based Access Control (ABAC):
ABAC uses attributes (such as location, time, or other contextual factors) to determine access. While highly flexible, it is more complex than needed for this scenario, which only requires role-based access based on job functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A recent audit of your organization’s user accounts revealed that some employees retain access to resources from their previous job roles even after being transferred to new departments. This represents a violation of which security principle?

A. Least privilege
B. Role-based access control
C. Time-of-day restrictions
D. Authentication

A

A is correct. The principle of least privilege states that users should only have the permissions necessary to perform their current job functions. Retaining access to resources from previous roles violates this principle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An organization uses an access control model where users are assigned security clearances. The clearance level is required to access sensitive data, and users cannot access data beyond their clearance level.

Which of the following BEST describes this access control model?

A. Discretionary access control (DAC)
B. Role-based access control (RBAC)
C. Mandatory access control (MAC)
D. Rule-based access control (Rule-BAC)

A

C is correct. Mandatory access control (MAC) assigns access based on security clearances and predefined security labels. Users can only access information for which they have the appropriate clearance and a need to know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Your organization wants to implement a password policy that requires users to create strong passwords. The policy should enforce the use of at least one uppercase letter, one number, and one special character. Additionally, passwords must be at least 10 characters long.

Which of the following BEST meets this requirement?

A. Password complexity
B. Password history
C. Password expiration
D. Password age

A

A is correct. Password complexity enforces rules requiring specific character types such as uppercase letters, numbers, and special characters. The minimum length requirement is also part of password complexity settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Your organization is configuring a time-based login restriction policy. Regular employees can only log in between 8:00 a.m. and 6:00 p.m., Monday through Friday. However, IT staff need access at any time to perform maintenance tasks.

Which of the following is the BEST way to configure these access rules?

A. Use role-based access control (RBAC) for both IT staff and regular employees.
B. Apply time-of-day restrictions for regular employees but exempt IT staff from these restrictions.
C. Implement mandatory access control (MAC) to enforce different access levels based on department.
D. Set up password expiration policies to ensure IT staff change their passwords more frequently.

A

B is correct. Time-of-day restrictions should be applied to regular employees, but IT staff, who require 24/7 access, should be exempt. This provides necessary flexibility for IT maintenance work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Your organization uses smart cards for physical security, and each smart card contains a digital certificate. The digital certificate is used to authenticate the user’s identity before they can access the network.

Which of the following is the authentication factor being used by the smart card?

A. Something you know
B. Something you are
C. Something you have
D. Something you do

A

C is correct. Smart cards fall under the “something you have” authentication factor because they are physical devices that the user must possess to authenticate.

20
Q

An organization implements a system that tracks user activities, such as login attempts and file access, to ensure that any suspicious behavior is logged and investigated.

Which part of the AAA model does this describe?

A. Authentication
B. Authorization
C. Accounting
D. Auditing

A

C is correct. Accounting refers to tracking and logging user activities, including login attempts and resource access, and is part of the AAA model.

21
Q

A healthcare organization is implementing a biometric authentication system. They need the system to be highly accurate and have the lowest possible rate of rejecting valid users.

Which of the following should they prioritize to achieve this?

A. A high FAR
B. A high CER
C. A low FRR
D. A low FAR

A

C is correct. A low False Rejection Rate (FRR) ensures that valid users are not mistakenly rejected, which is a priority for minimizing disruption in highly secure and sensitive environments like healthcare.

FAR (False Acceptance Rate)
CER (Crossover Error Rate)
FRR (False Rejection Rate)
FAR (False Acceptance Rate)

If low CER were an option, it would be the best choice because it balances both FRR and FAR to achieve high accuracy

21
Q

An organization is reviewing its password policy to align with NIST recommendations. The current policy requires users to reset passwords every 60 days and include at least one uppercase letter, one lowercase letter, one number, and one special character. Management wants to update the policy based on modern best practices.

Which of the following changes would MOST align with NIST’s updated password recommendations?

A. Increase password complexity by requiring more special characters
B. Eliminate mandatory password expiration if multi-factor authentication is implemented
C. Reduce password length to six characters
D. Require passwords to be changed every 30 days

A

B is correct. NIST recommends avoiding frequent password resets if multi-factor authentication (MFA) is in use, as this encourages stronger, more secure passwords that don’t need to be frequently changed.

22
Q

Your company is considering the implementation of smart card authentication to improve security. Which of the following is required to support the use of smart cards in the authentication process?

A. An embedded certificate
B. Password complexity rules
C. A password vault
D. Biometric enrollment

A

A is correct. Smart cards require an embedded certificate that includes the user’s private key, allowing the card to be used for certificate-based authentication.

23
Q

An organization wants to implement a system that provides secure, one-time use passwords that expire every 30 seconds. The solution should not require users to carry any additional hardware.

Which of the following solutions would BEST meet this requirement?

A. HOTP
B. Soft token
C. Hard token
D. Smart card

A

B is correct. A soft token, such as a mobile app generating Time-based One-Time Passwords (TOTP), fits the requirement for one-time passwords that expire every 30 seconds without requiring additional hardware.

A. HOTP: (HMAC BASED OTP)
HOTP generates one-time passwords, but they do not expire after a set time—they are valid until used. This doesn’t meet the requirement for expiration every 30 seconds.

C. Hard token:
A hard token is a physical device (such as a key fob) that generates one-time passwords. This would require users to carry additional hardware, which is against the requirement.

D. Smart card:
A smart card is a physical object used for authentication, which would also require users to carry additional hardware. It’s not designed for generating one-time use passwords

24
Q

Your company has implemented an account lockout policy to prevent brute force attacks. After five failed login attempts, the account is locked for 30 minutes. However, management is concerned that legitimate users might get locked out accidentally and experience downtime.

Which of the following modifications would BEST address this concern while maintaining security?

A. Increase the account lockout threshold to 10 failed attempts
B. Reduce the account lockout duration to 10 minutes
C. Disable the account lockout policy
D. Implement multi-factor authentication (MFA)

A

D is correct. Implementing multi-factor authentication (MFA) enhances security and can reduce the need for strict lockout policies, allowing legitimate users more flexibility without sacrificing security.

25
Q

An organization uses both passwords and geolocation as authentication factors. Users must log in using their credentials, and their location must match a known worksite.

Which of the following BEST describes the factors being used in this authentication method?

A. Something you know and something you have
B. Something you know and somewhere you are
C. Something you are and somewhere you are
D. Something you know and something you are

A

B is correct. The password is something you know, and the geolocation is somewhere you are, fulfilling the multi-factor authentication requirements.

26
Q

A security administrator is implementing an account disablement policy for employees who leave the company. Why is it recommended to disable accounts rather than delete them immediately?

A. To ensure data encrypted with the user’s account can still be accessed
B. To allow the user to continue accessing company resources during their notice period
C. To avoid confusion during audits
D. To allow the account to remain active in case the employee returns

A

A is correct. Disabling an account preserves the encryption keys associated with the account, allowing access to any data encrypted with that user’s credentials.

27
Q

Your organization is implementing a system where administrators have two separate accounts: one for day-to-day tasks and another for administrative tasks.

Which of the following BEST describes the security benefit of this approach?

A. Reduces the risk of privilege escalation attacks
B. Simplifies account management
C. Prevents unauthorized physical access
D. Increases user productivity

A

A is correct. Requiring administrators to use separate accounts for administrative tasks reduces the risk of privilege escalation attacks if their day-to-day account is compromised.

28
Q

A company requires users to log in only from specific computers in their office to prevent unauthorized access from home or public locations.

Which of the following authentication methods is the company MOST likely using?

A. Biometrics
B. Time-based restrictions
C. MAC address filtering
D. Smart cards

A

C is correct. MAC address filtering can be used to restrict access to specific devices, preventing users from logging in from unauthorized locations.

29
Q

An organization is considering implementing a password manager for its employees to securely store passwords. Which of the following is a key security benefit of using a password manager?

A. It eliminates the need for password complexity
B. It allows users to store and automatically retrieve passwords in an encrypted format
C. It prevents the need for multi-factor authentication
D. It eliminates the need for account lockout policies

A

B is correct. Password managers store passwords in an encrypted format, allowing users to retrieve them securely without remembering multiple complex passwords.

30
Q

A company is debating whether to use a browser-based password manager or a dedicated password vault application. Which of the following is a potential risk of using a browser-based password manager?

A. The passwords are not encrypted
B. The manager cannot store complex passwords
C. If the browser is compromised, all stored passwords could be exposed
D. It requires frequent password resets

A

C is correct. If the browser is compromised, a browser-based password manager could expose all stored passwords, creating a significant security risk.

31
Q

A financial institution is implementing dynamic KBA for high-risk transactions. Which of the following BEST describes how dynamic KBA works?

A. The system uses pre-set questions that the user must answer when resetting their password
B. The system generates questions based on publicly available data, such as credit reports, at the time of authentication
C. Users set up security questions during account creation
D. It relies on biometric data for authentication

A

B. The system generates questions based on publicly available data, such as credit reports, at the time of authentication is correct.

Dynamic Knowledge-Based Authentication (KBA) works by generating questions in real-time based on data that is not pre-set by the user but rather drawn from public records or credit reports. This helps verify the identity of users, particularly in high-risk transactions, without relying on static questions.

32
Q

Which of the following is a key difference between static KBA and dynamic KBA?

A. Static KBA is more secure than dynamic KBA
B. Static KBA uses preset questions, while dynamic KBA generates questions based on real-time data
C. Dynamic KBA is only used for password resets, while static KBA is used for high-risk transactions
D. Static KBA relies on biometric data, while dynamic KBA uses passwords

A

B. Static KBA uses preset questions, while dynamic KBA generates questions based on real-time data is correct.

The key difference between static and dynamic KBA is that static KBA relies on questions that are pre-set by the user during account creation (e.g., “What is your mother’s maiden name?”), while dynamic KBA generates questions in real-time based on publicly or privately available data (e.g., credit history or transaction details) during the authentication process.

33
Q

A company wants to implement an account lockout policy to prevent brute-force attacks. The current policy locks accounts after three failed attempts for 30 minutes. Users are frustrated with the policy. Which of the following BEST balances security and usability?

A. Increase the lockout threshold to 10 attempts
B. Reduce the lockout duration to 10 minutes
C. Implement multi-factor authentication and remove the lockout policy
D. Increase the lockout threshold to five attempts and reduce the lockout duration

A

D. Increase the lockout threshold to five attempts and reduce the lockout duration is correct.

Increasing the lockout threshold to five failed attempts and reducing the lockout duration provides a better balance between security and usability. It helps reduce user frustration while still providing protection against brute-force attacks. This adjustment makes the policy less strict, giving users more flexibility without significantly compromising security.D is correct. Increasing the threshold and reducing the lockout duration strikes a balance between preventing brute-force attacks and improving user experience.

34
Q

Which of the following is a key feature of a Privileged Access Management (PAM) system?

A. Automatically generating new user passwords after every session
B. Temporarily granting elevated privileges to users on request
C. Preventing administrators from using multi-factor authentication
D. Allowing users to access sensitive data without logging activity

A

B is correct. PAM systems can temporarily grant elevated privileges to users when needed, and automatically revoke them after a set period.

35
Q

An organization has implemented a PAM system to manage access to administrator accounts. Which of the following BEST describes how PAM systems enhance security?

A. They require all privileged users to use the same password
B. They store privileged account passwords in a secure vault and automatically rotate them
C. They eliminate the need for tracking privileged user activity
D. They disable all privileged accounts automatically after a set period

A

B. They store privileged account passwords in a secure vault and automatically rotate them is correct.

Privileged Access Management (PAM) systems enhance security by storing administrator and other privileged account passwords in a secure vault. These systems automatically rotate the passwords to reduce the risk of misuse, ensuring that only authorized users can access the accounts when needed. PAM also often includes features to track and monitor privileged account usage.

36
Q

A military organization uses Mandatory Access Control (MAC) to secure classified data. Which of the following elements is MOST likely to be used in this access control model?

A. Role-based privileges
B. Discretionary permissions
C. Security labels assigned to objects and users
D. Password policies

A

C. Security labels assigned to objects and users is correct.

In a Mandatory Access Control (MAC) system, security labels are assigned to both objects (such as files and data) and users. These labels determine access based on predefined classifications (e.g., Confidential, Secret, Top Secret). Users can only access objects that match or are below their security clearance level.

37
Q

An organization requires administrators to have two separate accounts: one for day-to-day tasks and another for privileged tasks. Which of the following BEST explains why this is a good security practice?

A. It helps prevent users from logging in from unauthorized locations
B. It limits the risk of privilege escalation attacks if the non-privileged account is compromised
C. It increases system performance by separating tasks
D. It reduces the need for password changes

A

B is correct. Having separate accounts limits the risk of privilege escalation if the administrator’s day-to-day account is compromised.

38
Q

An organization implements a firewall that only allows HTTP traffic during business hours. This access control policy is an example of:

A. Role-Based Access Control (RBAC)
B. Discretionary Access Control (DAC)
C. Rule-Based Access Control (Rule-BAC)
D. Mandatory Access Control (MAC)

A

C. Rule-Based Access Control (Rule-BAC) is correct.

Rule-Based Access Control (Rule-BAC) enforces access control decisions based on predefined rules, such as allowing HTTP traffic only during business hours. In this case, the firewall is configured to permit traffic based on time, which is a classic example of Rule-BAC.

39
Q

A user logs into a third-party application using their Google credentials without sharing their Google password with the application. This scenario is an example of which authorization protocol?

A. OAuth
B. SAML
C. LDAP
D. Kerberos

A

The correct answer is A. OAuth.

OAuth is an authorization protocol that allows users to log into third-party applications using their credentials from services like Google, without sharing their actual password with the third-party application. Instead, OAuth provides tokens that grant the necessary permissions to the third-party app.

40
Q

Which of the following is a key difference between OAuth and SAML?

A. OAuth is used for authentication, while SAML is used for authorization
B. OAuth is used for web-based single sign-on (SSO), while SAML is primarily for network authentication
C. OAuth is used for authorization, while SAML is used for web-based single sign-on (SSO)
D. OAuth relies on user credentials, while SAML relies on tokens

A

The correct answer is C. OAuth is used for authorization, while SAML is used for web-based single sign-on (SSO).

OAuth is primarily an authorization framework, allowing third-party applications to access a user’s resources without exposing their credentials.
SAML (Security Assertion Markup Language) is widely used for web-based Single Sign-On (SSO) and focuses on authentication, where a user’s identity is passed between identity providers and service providers in a secure manner.

OAuth (Authorization Example):
You use Facebook to log into a new app. Instead of giving the app your Facebook password, Facebook asks if you allow the app to access your profile. You say yes, and now the app can use your Facebook info without needing your password. OAuth lets the app get limited access without sharing your password.

SAML (Single Sign-On Example):
You log into your company’s system once, and after that, you can access other work tools (like email or HR apps) without logging in again. SAML lets you log in once and use multiple services without logging in again.

41
Q

Your organization has noticed a user logging in from two distant geographic locations within a short time frame, an occurrence that is impossible based on travel time. This type of detection is known as:

A. Concurrent session monitoring
B. Impossible travel time detection
C. Dynamic KBA
D. Geolocation-based access control

A

The correct answer is B. Impossible travel time detection.

This detection method identifies a login attempt from two geographically distant locations within a time frame that makes it physically impossible for the user to travel between them. This is often used to flag potentially suspicious activity, such as account compromise.

42
Q

A company allows its employees to access resources in a partner organization’s network without needing to log in again. This setup is an example of:

A. SSO
B. PAM
C. FIM
D. RBAC

A

The correct answer is C. FIM

Federated Identity Management (FIM) allows users to access resources across different organizations or domains (such as partner networks) using a single set of credentials, without needing to log in again. This enables seamless access between different organizations’ systems.

Single Sign-On (SSO)
Privileged Access Management (PAM)
Federated Identity Management
Role-Based Access Control (RBAC)

43
Q

Which of the following protocols is commonly used in federated identity management to provide web-based single sign-on (SSO)?

A. SAML
B. OAuth
C. RADIUS
D. LDAP

A

The correct answer is A. SAML.

SAML (Security Assertion Markup Language) is a protocol commonly used in federated identity management to provide web-based Single Sign-On (SSO). It allows users to authenticate once and access multiple web applications across different organizations without needing to log in again.

44
Q

Your organization is implementing physical security keys to enhance authentication. Employees will use a USB security key in conjunction with a password to access systems.

Which of the following BEST describes the authentication factors being used?

A. Something you know and something you are
B. Something you have and something you know
C. Something you know and somewhere you are
D. Something you have and somewhere you are

A

B is correct. The password is something you know, and the security key is something you have, fulfilling the requirement for multi-factor authentication.

45
Q

A network administrator is setting up a new router for the first time. The administrator leaves the default password unchanged.

Which of the following threats does this action introduce?

A. Increased risk of brute-force attacks
B. Lack of multi-factor authentication
C. Susceptibility to dictionary attacks
D. Vulnerability to default credential exploitation

A

The correct answer is D. Vulnerability to default credential exploitation.

By leaving the default password unchanged, the router is vulnerable to attacks that exploit default credentials. Attackers often know or can easily find out the default usernames and passwords for various devices, making it easier for them to gain unauthorized access.

46
Q

Your organization wants to prevent employees from logging into the network outside of normal business hours. Which of the following controls should be implemented?

A. Account lockout threshold
B. Time-of-day restrictions
C. Location-based restrictions
D. Password expiration policy

A

B is correct. Time-of-day restrictions prevent users from logging in during specific hours, ensuring access is only available during business hours.

47
Q

During a security audit, an administrator discovers that several users have accumulated permissions they no longer need due to job role changes. What is this situation called?

A. Privilege creep
B. Privilege escalation
C. Role-based access control
D. Time-of-day restrictions

A

A is correct. Privilege creep occurs when users accumulate excessive permissions that are no longer necessary for their current job role, violating the principle of least privilege. This can lead to security risks because users may have more access than necessary for their current duties. Periodic reviews and adjustments of permissions are essential to prevent privilege creep.

48
Q

Your organization uses a Mandatory Access Control (MAC) system with security labels such as Confidential, Secret, and Top Secret. An employee with a Secret clearance needs to access a Top Secret document.

Which of the following is true about this situation?

A. The employee can access the document if they have a need to know
B. The employee can access the document based on their clearance level
C. The employee cannot access the document because their clearance is not high enough
D. The employee cannot access the document unless it is shared via DAC

A

C is correct. In a MAC system, the employee’s clearance level must match or exceed the document’s security label, so they cannot access a Top Secret document with only a Secret clearance, regardless of whether they have a need to know.

49
Q

An organization uses Discretionary Access Control (DAC) for file permissions. Which of the following is TRUE about this access control model?

A. Access is determined based on the user’s job role
B. Access is controlled by security labels and clearances
C. The file owner controls who can access the file and what permissions they have
D. The system administrator assigns permissions based on company policies

A

C is correct. In a DAC system, the owner of a file or object has full control over its permissions and can decide who can access the object and what actions they can perform.

50
Q

A manager at your company is conducting a permission audit review to ensure that all users have the appropriate access to resources based on their current roles. This process is called:

A. Attestation
B. Privilege escalation
C. Role-based access control
D. Account disablement

A

The correct answer is A. Attestation.

Attestation is the process of reviewing and verifying that users have the appropriate access to resources based on their roles, adding an extra layer of verification. This involves ensuring that permissions are aligned with current job responsibilities and is often done periodically to prevent privilege creep and ensure compliance with security policies.

51
Q

An organization implements a system that allows users to authenticate once and access resources in different networks without having to log in again. Which of the following technologies enables this?

A. OAuth
B. LDAP
C. Federation
D. Kerberos

A

The correct answer is C. Federation.

Federation (or FIM) allows users to authenticate once and access resources across multiple networks or organizations without having to log in again. This is commonly implemented using protocols such as SAML or OpenID Connect, enabling Single Sign-On (SSO) across different domains.

52
Q

A company wants to allow third-party applications to access users’ data without requiring the user to share their login credentials. Which of the following technologies would BEST meet this requirement?

A. Kerberos
B. SAML
C. OAuth
D. Federation

A

C is correct. OAuth is used for authorization, allowing third-party applications to access user data without the user needing to share their login credentials.

53
Q

A biometric system used by your organization has a high False Acceptance Rate (FAR). Which of the following actions would MOST likely improve the accuracy of the system?

A. Increase the False Rejection Rate (FRR)
B. Decrease the Crossover Error Rate (CER)
C. Increase the Crossover Error Rate (CER)
D. Disable multi-factor authentication

A

B is correct. Decreasing the Crossover Error Rate (CER) improves the overall accuracy of the biometric system by finding the optimal balance between false acceptance and false rejection rates.