Chapter 4 Deploying Enterprise Authentication and Authorization Controls Mark B Flashcards
What is the container on a Windows operating system that allows the secure storage of user credentials and passwords?
A. Password repository application
B. Credential Manager
C. iCloud Keychain
D. End user password storage
B. Credential Manager
What security would be provided for the storage of passwords in a cloud repository?
A. Advanced access control
B. Behavioral Analytics
C. Continuous Validation
D. Reversible Encryption
A. Advanced access control
B. Behavioral Analytics
C. Continuous Validation
What type of device allows the secure retention of user passwords?
A. Hardware key manager
B. Removable Storage
C. Password policies
D. iCloud keychain
A. Hardware key manager
What management solution allows auditing of privileged accounts and checkout of these credentials?
A. Password policies
B. Privileged access management
C. Password complexity
D. Password auditing
B. Privileged access management
What password policy will ensure a password cannot be reused? Choose two
A. Password length
B. Password reuse
C. Password complexity
D. Password history
B. Password reuse
D. Password history
What password policy would most likely force Bill to change his password from flowerpot to f10w3rp0t?
A. Password length
B. Password reuse
C. Password complexity
D. Password history
C. Password complexity
What password policy will ensure Mary cannot spend her lunch break resetting her password 24 times to make it the original password?
A. Minimum password age
B. Maximum password age
C. Password complexity
D. Password history
A. Minimum password age
How can you detect the use of a poor password that may match dictionary words?
A. Password spraying
B. Password auditing
C. Password guessing
D. Password reset
B. Password auditing
What is required for CHAP authentication, when setting a password requirements policy?
A. Strong encryption
B. Reversible Encryption
C. Forward Encryption
D. Complexity
B. Reversible Encryption
What is the term used when credentials can be used with a third party utilizing SSO?
A. Identity proofing
B. Identity federation
C. Identity cloud
D. Identity Trust
B. Identity federation
What XML federation service will most likely be used to access third party cloud based corporate portals?
A. Shibboleth
B. SAML
C. OAuth
D. OpenID
B. SAML
Which federation service will most likely be used to access third party cloud based digital services?
A. OAuth
B. SAML
C. Kerberos
D. LDAP
A. OAuth
What access control will offer the most security for a government agency?
A. MAC
B. DAC
C. Role based access control
D. Rule based access control
A. MAC
What access control will offer the most flexibility for decentralized administration?
A. MAC
B. DAC
C. Role based access control
D. Rule based access control
B. DAC
What access control will allow for access based upon country and department?
A. MAC
B. DAC
C. Role based access control
D. Attribute based access control
D. Attribute based access control