Domain 5: Review Questions Flashcards
Which of the following is not an example of a knowledge authentication factor?
A. Password
B. Mother’s maiden name
C. City of birth
D. Smart card
D.
Knowledge factors are something a person knows, including passwords, mother’s maiden name, city of birth, and date of birth. Ownership factors are something a person has, including a smart card.
Which of the following statements about memory cards and smart cards is false?
A. A memory card can be a swipe card that contains user authentication information.
B. Memory cards are also known as integrated circuit cards (ICCs).
C. Smart cards contain memory and an embedded chip.
D. Smart card systems are more reliable than memory card systems.
B.
Memory cards are not also known as integrated circuit cards (ICCs). Smart cards are also known as ICCs.
A memory card is a swipe card that is issued to valid users and it contains user authentication information.
A smart card accepts, stores, and sends data but can hold more data than a memory card. Smart cards, often known as integrated circuit cards (ICCs), contain memory like a memory card but also contain an embedded chip like bank or credit cards.
Which biometric method is most effective as far as accuracy?
A. Iris scan
B. Retina scan
C. Fingerprint
D. Handprint
B.
Retina scans are considered more effective as far as accuracy than iris scans, fingerprints, and handprints. Retina Scan examines unique blood vessel patterns in the back of the eye.
What is a Type I error in a biometric authentication system?
A. Crossover error rate (CER)
B. False rejection rate (FRR)
C. False acceptance rate (FAR)
D. Throughput rate
B. A Type I error in a biometric system is false rejection rate (FRR).
A Type II error in a biometric system is false acceptance rate (FAR). Crossover error rate (CER) is the point at which FRR equals FAR. Throughput rate is the rate at which users are authenticated.
Which access control model is a desirable model used by routers and firewalls to control access to secure networks?
A. Discretionary access control
B. Mandatory access control
C. Role-based access control
D. Rule-based access control
D.
Rule-based access control is a desirable model used by routers and firewalls to control access to networks.
The other three types of access control models are not usually implemented by routers and firewalls.
Which threat is not considered a social engineering threat?
A. Phishing
B. Pharming
C. DoS attack
D. Dumpster diving
C.
A denial-of-service (DoS) attack is not considered a social engineering threat. The other three options are considered to be social engineering threats.
Which of the following statements best describes an IDaaS implementation?
A. Ensures that any instance of identification and authentication to a resource is managed properly.
B. Collects and verifies information about an individual to prove that the person who has a valid account is who that person claims to be.
C. Provides a set of identity and access management functions to target systems on customers’ premises and/or in the cloud.
D. Exchanges authentication and authorization data between organizations or security domains.
C.
An Identity as a Service (IDaaS) implementation provides a set of identity and access management functions to target systems on customers’ premises and/or in the cloud. Session management ensures that any instance of identification and authentication to a resource is managed properly. A proof of identity process collects and verifies information about an individual to prove that the person who has a valid account is who that person claims to be.
Which of the following is an example of multifactor authentication?
A. Username and password
B. Username, retina scan, and smart card
C. Retina scan and finger scan
D. Smart card and security token
B.
Using a username, retina scan, and smart card is an example of multifactor authentication. The username is something you know, the retina scan is something you are, and the smart card is something you have.
You decide to implement an access control policy that requires that users only log on from certain workstations within your organization’s facility. Which type of authentication factor are you implementing?
A. Knowledge factor
B. Location factor
C. Ownership factor
D. Characteristic factor
B.
You are implementing a location factor, which is based on where a person is located when logging in.
Which threat is considered a password threat?
A. Buffer overflow
B. Sniffing
C. Spoofing
D. Brute-force attack
D. A brute-force attack is considered a password threat.
Which session management mechanisms are often used to manage desktop sessions?
A. Screensavers and timeouts
B. FIPS 201.2 and NIST SP 800-79-2
C. Bollards and locks
D. KDC, TGT, and TGS
A.
Desktop sessions can be managed through screensavers, timeouts, logon, and schedule limitations. FIPS PUB 201.2 and NIST SP 800-79-2 are documents that provide guidance on proof of identity.
Physical access to facilities can be provided securely using locks, fencing, bollards, guards, and CCTV. In Kerberos, the Key Distribution Center (KDC) issues a ticket-granting ticket (TGT) to the principal. The principal sends the TGT to the ticket-granting service (TGS) when the principal needs to connect to another entity.
Which of the following is a major disadvantage of implementing an SSO system?
A. Users are able to use stronger passwords.
B. Users need to remember the login credentials for a single system.
C. User and password administration is simplified.
D. If a user’s credentials are compromised, an attacker can access all resources.
D.
If a user’s credentials are compromised in a single sign-on (SSO) environment, attackers have access to all resources to which the user has access. All other choices are advantages to implementing an SSO system.
Which type of attack is carried out from multiple locations using zombies and botnets?
A. TEMPEST
B. DDoS
C. Backdoor
D. Emanating
B.
A distributed DoS (DDoS) attack is a DoS attack that is carried out from multiple attack locations. Vulnerable devices are infected with software agents, called zombies. They turn the vulnerable devices into botnets, which then carry out the attack.
Devices that meet TEMPEST standards implement an outer barrier or coating, called a Faraday cage or Faraday shield. A backdoor or trapdoor is a mechanism implemented in many devices or applications that gives the user who uses the backdoor unlimited access to the device or application. Emanations are electromagnetic signals that are emitted by an electronic device. Attackers can target certain devices or transmission mediums to eavesdrop on communication without having physical access to the device or medium.
Which type of attack is one in which an unauthorized person gains access to a network and remains for a long period of time with the intention of stealing data?
A. APT
B. ABAC
C. Access aggregation
D. FIM
A.
An advanced persistent threat (APT) is an attack in which an unauthorized person gains access to a network and remains for a long period of time with the intention of stealing data. Attribute-based access control (ABAC) grants or denies user requests based on arbitrary attributes of the user and arbitrary attributes of the object, and environment conditions that may be globally recognized. Access aggregation is a term that is often used synonymously with privilege creep. Access aggregation occurs when users gain more access across more systems. In federated identity management (FIM), each organization that joins the federation agrees to enforce a common set of policies and standards. These policies and standards define how to provision and manage user identification, authentication, and authorization.
Which of the following is a formal process for creating, changing, and removing users that includes user approval, user creation, user creation standards, and authorization?
A. NIST SP 800-63
B. Centralized access control
C. Decentralized access control
D. Provisioning life cycle
D.
The provisioning life cycle is a formal process for creating, changing, and removing users. This process includes user approval, user creation, user creation standards, and authorization. Users should sign a written statement that explains the access conditions, including user responsibilities. NIST SP 800-63 provides a suite of technical requirements for federal agencies implementing digital identity services, including an overview of identity frameworks; and using authenticators, credentials, and assertions in digital systems. In centralized access control, a central department or personnel oversee the access for all organizational resources. This administration method ensures that user access is controlled in a consistent manner across the entire enterprise. In decentralized access control, personnel closest to the resources, such as department managers and data owners, oversee the access control for individual resources.
Henry uses his organizationally provided credentials to log into his workstation and is then able to use services across the organization and in the cloud. What identity solution has his organization implemented?
A. An access control list
B. Single sign-on
C. Multifactor authentication
D. Role-based access control
B.
Single sign-on provides a single authentication process to allow authorization to multiple services. An access control list, or ACL, is a ruleset used to determine if a subject can gain access to a service or system. Multifactor requires multiple factors, and the specifics of how Henry logged in were not discussed in the question. Finally, role-based access control uses a subject’s role(s) to determine if they can access a service or system, and no mention of roles was made.
Jim’s organization-wide implementation of IDaaS offers broad support for cloud-based applications. Jim’s company does not have internal identity management staff and does not use centralized identity services. Instead, they rely upon Active Directory for AAA services. Which of the following options should Jim recommend to best handle the company’s on-site identity needs?
A. Integrate on-site systems using OAuth.
B. Use an on-premises third-party identity service.
C. Integrate on-site systems using SAML.
D. Design an internal solution to handle the organization’s unique needs.
B.
Since Jim’s organization is using a cloud-based identity as a service solution, a third-party, on-premises identity service can provide the ability to integrate with the IDaaS solution, and the company’s use of Active Directory is widely supported by third-party vendors. OAuth is used to log in to third-party websites using existing credentials and would not meet the needs described. SAML is a markup language and would not meet the full set of AAA needs. Since the organization is using Active Directory, a custom in-house solution is unlikely to be as effective as a preexisting third-party solution and may take far more time and expense to implement.
What role does a policy enforcement point play in a zero trust environment?
A. It makes decisions for the policy engine.
B. It is the workstation or mobile device used by the end user.
C. It deploys role-based access controls based on local policy.
D. It receives authorization requests and sends them to the policy decision point.
D.
A policy enforcement point in a zero trust environment receives authorization requests and then sends them to the policy decision point. They are used anywhere that authorization controls are needed. They do not make decisions for the policy engine, can exist beyond workstations and mobile devices, and use policies set at the zero trust control layer rather than just at the endpoint device.
Voice pattern recognition is what type of authentication factor?
A. Something you know
B. Something you have
C. Something you are
D. Somewhere you are
C.
Voice pattern recognition is “something you are,” a biometric authentication factor, because it measures a physical characteristic of the individual authenticating.
If Susan’s organization requires her to log in with her username, a PIN, a password, and a retina scan, how many distinct authentication factor types has she used?
A. One
B. Two
C. Three
D. Four
B.
Susan has used two distinct types of factors: the PIN and password are both Type 1 factors, and the retina scan is a Type 3 factor. Her username is not a factor.
Charles wants to deploy a credential management system (CMS). He wants to keep the keys as secure as possible. Which of the following is the best design option for his CMS implementation?
A. Use AES-256 instead of 3DES.
B. Use long keys.
C. Use an HSM.
D. Change passphrases regularly.
C.
Hardware Security Modules, or HSMs, are the most secure way to store keys associated with a CMS. They provide enhanced key management capabilities and are often required to be FIPS certified. In addition to these advantages, an HSM can improve cryptographic performance for the organization due to dedicated hardware designed for just that purpose. Long keys and using AES-256 are good practices, but an HSM provides greater security and will require appropriate cryptographic controls already. Changing passphrases can be challenging across an organization; instead, securing the passphrases and keys is more important and reasonable for most organizations.
Brian is a researcher at a major university. As part of his research, he logs into a computing cluster hosted at another institution using his own university’s credentials. Once logged in, he is able to access the cluster and use resources based on his role in a research project, as well as using resources and services in his home organization. What has Brian’s home university implemented to make this happen?
A. Domain stacking
B. Federated identity management
C. Domain nesting
D. Hybrid login
B.
Brian’s organization is using a federated identity management approach where multiple organizations allow identities to be used across the organizations. Each organization needs to conduct identity proofing of their own staff members’ identities and provide them with rights and role information that will allow them to use resources within the federated identity environment.
When Sally attempts to authenticate to her organization’s services, she knows that the organization uses a mobile device management tool to check her location and whether she’s logging in from her company-issued mobile device. What type of authentication is this?
A. Context-aware
B. Knowledge-based
C. Identity factoring
D. Zero trust
A.
Authentication that takes attributes such as location, device, and time of day into account is context-aware authentication. This allows organizations to make choices about whether the authentication is appropriate and allowed in addition to the use of credentials. The decision is based on contextual information, not user knowledge or identity factors, which are used only to authenticate. Zero trust may leverage context information, but context-aware authentication alone does not indicate zero trust.
What major issue often results from decentralized access control?
A. Access outages may occur.
B. Control is not consistent.
C. Control is too granular.
D. Training costs are high.
B.
Decentralized access control can result in less consistency because the individuals tasked with control may interpret policies and requirements differently and may perform their roles in different ways. Access outages, overly granular control, and training costs may occur, depending on specific implementations, but they are not commonly identified issues with decentralized access control.
Callback to a landline phone number is an example of what type of factor?
A. Something you know
B. Somewhere you are
C. Something you have
D. Something you are
B.
A callback to a landline phone number is an example of a “somewhere you are” factor because of the fixed physical location of a wired phone. A callback to a mobile phone would be a “something you have” factor.
What common behavior drives the NIST recommendation that passwords should not expire?
A. Attackers would not have enough time to compromise passwords if they expired.
B. Users often make minimal changes to passwords to handle change requirements.
C. Password expiration leads to too little support overhead.
D. Re-hashing passwords when changes are required is computationally intensive.
B.
The NIST recommendation to not expire passwords recognizes that users often make minimal changes to their passwords when they are required to change them. In addition, password changes drive significant support overhead as users forget their passwords or otherwise face challenges with them. Longer password lives do create the potential for attackers to have longer to compromise them, but modern password recommendations look for multifactor authentication, which means a compromised password is less of a threat. Hashing new passwords does require computation, but not a significant amount using modern hardware.
What three functions make up the AAA model?
A. Access control, authentication, and authorization
B. Access, administration, and authorization
C. Authentication, authorization, and accounting
D. Accounting, auditing, and assessment
C.
AAA refers to a set of security protocols that are used to identify and authorize users and record their activities. The acronym stands for authentication, authorization, and accounting.
What directory-based technology underlies Microsoft Active Directory single sign-on?
A. LDAP
B. zero trust
C. Shibboleth
D. RADIUS
A.
Active Directory relies on the Lightweight Directory Access Protocol (LDAP) as part of its single sign-on (SSO) implementation. Zero trust is not a SSO implementation, and Shibboleth is an open-source identity management system. RADIUS is not a single sign-on implementation, although some vendors use it behind the scenes to provide authentication for proprietary SSO.
Sameer’s organization needs to perform identity proofing for new customers. What type of authentication is best suited to identity proofing in this scenario?
A. Cognitive passwords
B. Knowledge-based authentication
C. Palm scans
D. USB tokens
B.
Knowledge-based authentication relies on information that only the individual who wants to prove their identity is likely to know. This might include a mortgage payment amount, vehicle information, or driver’s license number among many options. Cognitive passwords, or security questions, are created by users, which means they aren’t suited to this type of identity proofing. Palm scans and USB tokens both require prior engagement with the user as well and thus aren’t suited for identity proofing with users who are new customers.
What type of access controls allow the owner of a file to grant other users access to it using an access control list?
A. Role-based
B. Nondiscretionary
C. Rule-based
D. Discretionary
D.
When the owner of a file makes the decisions about who has rights or access privileges to it, they are using discretionary access control. Role-based access controls would grant access based on a subject’s role, while rule-based controls would base the decision on a set of rules or requirements. Nondiscretionary access controls apply a fixed set of rules to an environment to manage access. Nondiscretionary access controls include rule-, role-, and lattice-based access controls.
Alex’s job requires him to see protected health information (PHI) to ensure proper treatment of patients. His access to their medical records does not provide access to patient addresses or billing information. What access control concept best describes this control?
A. Separation of duties
B. Constrained interfaces
C. Context-dependent control
D. Need to know
D.
Need to know is applied when subjects like Alex have access to only the data they need to accomplish their job. Separation of duties is used to limit fraud and abuse by having multiple employees perform parts of a task. Constrained interfaces restrict what a user can see or do and would be a reasonable answer if need to know did not describe his access more completely in this scenario. Context-dependent control relies on the activity being performed to apply controls, and this question does not specify a workflow or process.
Ifemoa wants to ensure that users in her organization cannot change their password to a previously used password. What setting should she configure?
A. Password length
B. Maximum password age
C. An MFA requirement
D. Password history
D.
Password history tracks what passwords have been set previously and will not allow reuse. A specific number of past passwords is typically set, and passwords themselves should not be retained. Instead, properly secured hashes are retained and compared to hashes of the new passwords. Length, maximum age, and MFA do not solve the issue of password reuse.
With a password history set, Ifeoma wants to prevent users from resetting their password multiple times to allow them to return to their original password. What setting should she apply?
A. A password complexity requirement
B. A maximum password age
C. A minimum password age
D. A password length requirement
C.
Ifeoma knows that a minimum password age of one day will discourage users from resetting their passwords to attempt to return to their original password. Length and complexity do not prevent this if the original password met these requirements, and a maximum age is set in organizations that require password changes on a recurring basis.
With her organization’s password behavior under control, Ifeoma wants to ensure that a lost password will not result in easy compromise of her company’s accounts. Which of the following controls provides the best protection against password loss or exposure-related compromise?
A. MFA
B. SSO
C. Federation
D. Password rotation
A.
Requiring multifactor authentication (MFA) is a common security measure used to prevent unauthorized access to an account in case of password loss or exposure. SSO allows the use of an account throughout systems or services. Federation connects different organizations together, allowing the use of credentials between trusted partners, and password rotation can help, but lost passwords remain dangerous until the rotation happens allowing days, weeks, or even months of potential vulnerable time.