Cloud+7 Flashcards
1
Q
1.Milo has set up smart cards for users in the company’s main office. He wants to tie them into the authentication systems so that users can log into their workstations with them as well as access certain resources. Which of the following does he need to assign to each user in order to make this integration work? a. Policy b. Digital certificate c. Role d. Group
A
B
2
Q
2.Sharon is having trouble logging into the new cloud-based web application that her small company uses. It asks whether she wants to use a local account or an OpenID account. Which of the following is used by OpenID in order to implement authentication? a. QR b. OAuth c. 2FA d. PIN
A
B
3
Q
3.Fred is trying to access the company’s cloud-based CRM system while traveling abroad in Europe. He receives a message that access to this application is not allowed from the country he is currently in and lists the IP address detected by his connection. Which of the following factors of authentication is the CRM system using? a. Something you know b. Something you do c. Somewhere you are d. Something you have
A
C
4
Q
4.Noah has gone to work for the government and sees that some systems use a method of labeling data as classified, secret, and top secret rather than creating groups of users and applying permissions for those groups. Which of the following describes these systems of labeling data? a. DAC b. RBAC c. MAC d. TAC
A
C
5
Q
5.Lincoln is assigning permissions to users and groups for a new application that he is deploying. As he’s doing this, which of the following principles should he make sure he follows? a. Minimal overhead b. Least privilege c. Minimum access d. Least permissions
A
B
6
Q
6.Rose is implementing digital certificates for all of the users in her organization. Which of the following certificate types should she use? a. SSL b. TLS c. PKI d. CA
A
B
7
Q
7.Fictional Corp is trying out a new experimental technology that analyzes how users type as part of a multifactor authentication implementation. Which of the following categories of authentication factors would this fall into? a. Something you know b. Something you are c. Something you do d. Something you have
A
C
8
Q
8.Mark manages a custom application that resides on a cloud service provider that relies on users to authenticate by means of entering a username and password. Which of the following factors of authentication does this application use? a. Something you have b. Something you are c. Something you know d. Something you do
A
C
9
Q
9.Allen is visiting one of his client’s data centers and, after signing in, is escorted through the premises the entire time. He notices that, in order to gain access to the data center, the employee had to swipe a proximity badge, key in a 6 digit code, and place his finger on a scanner. Which of the following describes the type of security that he just witnessed? a. MFA b. SFA c. MTD d. SLA
A
A
10
Q
10.Fictional Corp has assigned each user within their Active Directory implementation a username. This username is a form of: a. accounting b. authentication c. authorization d. identity
A
D
11
Q
11.Fictional Corp has a variety of applications deployed across multiple cloud service providers. Claude has been tasked with making sure that users aren’t required to have separate accounts for each application. Which of the following should he look at using to meet that goal? a. DRP b. SSO c. DNS d. DHCP
A
B
12
Q
12.Sean has implemented an automatic account locking policy that will lock a user account after 5 invalid attempts. Which of the following types of attacks will this help thwart? a. Smurf attack b. Brute force c. Trickle down d. Passwrong
A
B
13
Q
13.Darius manages a directory of users for one of the domains within his organization. Which of the following describes the protocol in use for querying the directory? a. DNS b. QWERTY c. LDAP d. SDP
A
C
14
Q
14.Judy’s company is implementing a new authentication technology that requires assigning certificates to users and issuing smart cards. Which of the following does she need to install and configure to manage the certificates? a. RA b. CRT c. CA d. CRL
A
C
15
Q
15.Martin is running an analysis on the logs from one of the web servers that resides on the company’s private cloud. He finds that some users are accessing a site they shouldn’t be able to, as the firewall should have rules to prevent them from accessing the server. Which of the following might be how they were able to access the site?
a. The firewall wasn’t working.
b. The users found a way to bypass the firewall.
c. The rules on the firewall were listed in an incorrect order.
d. The firewall hadn’t been patched since the latest update was released.
A
C