Identity and Access Management (2) Flashcards
You are looking for an authentication method that has one-time passwords and works well with the Initiative for Open Authentication. However, the user should have unlimited time to use the password. Which of the following would be your best choice?
CHAP
TOTP
HOTP
HOTP
HMAC-based One-Time Password (HOTP) is a one-time password that is used by the Initiative for Open Authentication
Gerard is trying to find a flexible remote access protocol that can use either TCP or UDP. Which of the following should he select?
RADIUS
TACACS+
TACACS
TACACS
The original TACACS defined in RFC 1492 can use either UDP or TCP
Emiliano is considering voice recognition as part of his access control strategy. What is one weakness with voice recognition?
People’s voices change.
Systems require training.
High false negative rate
Systems require training.
Voice recognition systems have to be trained to recognize the voices of authorized users, and that training takes time
You are explaining facial recognition to a colleague. What is the most significant drawback to implementing facial recognition?
These systems can be expensive.
These systems can be fooled with facial hair, glasses, etc.
These systems have a high false positive rate.
These systems can be expensive.
The correct answer is that facial recognition is among the most expensive biometrics to implement
Mohanned is responsible for account management at his company. He is very concerned about hacking tools that rely on rainbow tables. Which of the following would be most effective in mitigating this threat?
Password age
Password expiration
Password length
Password length
Rainbow table attacks are best mitigated by longer passwords. Generating rainbow tables are computationally intensive, and longer passwords (over 14 characters) cannot be cracked by most rainbow tables
Mary is a security administrator for a mid-sized company. She is trying to securely off-board employees. What should she do with the network account for an employee who is being off-boarded?
Disable the account.
Delete the account.
Change the account password.
Disable the account.
Disabling the account will leave all resources intact, including history and logs, but will render the account unusable
Your supervisor tells you to implement security based on your users’ physical characteristics. Under which type of security would hand scanning and retina scanning fall?
CHAP
Multifactor
Biometrics
Biometrics
Biometric security is any security based on a user’s physical characteristics
What port does TACACS use?
TCP 143
TCP and UDP 49
TCP 443
TCP and UDP 49
TACACS uses TCP and UDP 49
A company-wide policy is being created to define various security levels. Which of the following systems of access control would use documented security levels like Confidential or Secret for information?
RBAC
MAC
DAC
MAC
Mandatory access control (MAC) is based on documented security levels associated with the information being accessed
There is a common security issue that is extremely hard to control in large environments. It occurs when a user has more computer rights, permissions, and privileges than what is required for the tasks the user needs to fulfill. This is the opposite of what principle?
Separation of duties
Least privileges
Transitive trust
Least privileges
All accounts should have just enough privileges to execute their job functions. This is referred to as least privileges
Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?
DAC
RBAC
MAC
DAC
Discretionary Access Control (DAC) allows data owners to assign permissions
John is performing a port scan of a network as part of a security audit. He notices that the domain controller is using secure LDAP. Which of the following ports would lead him to that conclusion?
389
443
636
636
Secure lightweight directory access protocol uses port 636 by default
Which of the following access control methods grants permissions based on the user’s position in the organization?
RBAC
DAC
ABAC
RBAC
Role-Based Access Control (RBAC) grants permissions on the user’s position within the organization
Which of the following can be used as a means for dual-factor authentication?
Password and PIN number
RADIUS and L2TP
Iris scan and password
Iris scan and password
Dual-factor authentication requires at least one authentication method from at least two categories. The categories are: Type I, which is something you know; Type II, which is something you have; and Type III, which is something you are. Option D is correct because it names authentication methods from two different categories: Type III (iris scan) and Type I (password)
Kerberos uses which of the following to issue tickets?
Certificate authority
Ticket-granting service
Key distribution center
Key distribution center
The Key Distribution Center (KDC) issues tickets. The tickets are generated by the ticket-granting service, which is usually part of the KDC