Identity and Access Management (3) Flashcards
Laura is a security admin for a mid-sized mortgage company. She wants to ensure that the network is using the most secure login and authentication scheme possible. Which of the following would be her best choice?
Iris scanning
Fingerprint scanning
Multifactor authentication
Multifactor authentication
Multi-factor authentication uses at least one authentication method from at least two of the three categories. For example, a password (Type I: something you know) and a swipe card (Type II: something you have). Multi-factor authentication is the strongest authentication
Charles is a CISO for an insurance company. He recently read about an attack wherein an attacker was able to enumerate all the network resources, and was able to make some resources unavailable. All this was done by exploiting a single protocol. Which protocol should Charles secure to mitigate this attack?
SNMP
LDAP
HTTP
LDAP
Lightweight Directory Access Protocol (LDAP) is often described as a phone book for your network. It lists all the network resources. Various attacks on LDAP can give the attacker a very thorough inventory of your network. Furthermore, an attacker can remove an item from LDAP and thus render it inaccessible. LDAP can be secured with TLS, and thus become LDAPS (LDAP Secure)
Robert is using PAP for authentication in his network. What is the most significant weakness in PAP?
Unsigned authentication
Single factor
Credentials sent in cleartext
Credentials sent in cleartext
Password Authentication Protocol (PAP) is a very old protocol that sent username and password in clear text. This should no longer be used
You are responsible for account access control and authorization at a large university. There are approximately 30,000 students and 1,200 faculty/staff for whom you must manage accounts. Which of the following would be the best access control/account management approach?
Group-based
Location-based
MAC
Group-based
With larger organizations, group-based is usually the most effective. Users are placed in groups (student, faculty, IT staff, support staff, administration, etc.), and permissions are managed for the group
Which of the following is most important in managing account permissions?
Account recertification
Usage auditing
Standard naming conventions
Account recertification
Periodic recertification of accounts is critical. The recertification process verifies that the account holder still requires the permissions they have been granted
Which of the following would be the best choice for naming the account of John Smith, who is a domain administrator?
dm_jsmith
jsmithAdmin
jsmith
jsmith
While you should use standard naming conventions, the names of accounts should not reflect the actual account role
Megan is very concerned about file system security on her network servers. Which of the following is the most basic form of file system security?
Encryption
Access control
Auditing
Access control
Access control to files and directories is the most fundamental aspect of file system security. This includes selecting the correct access control methodology (MAC, DAC, RBAC)
Karen is responsible for account security in her company. She has discovered a receptionist whose account has a six-character password that has not been changed in two years, and her password history is not being maintained. What is the most significant problem with this account?
Nothing, this is adequate for a low-security position.
The password length is the most significant problem.
The lack of password history is the most significant problem.
The password length is the most significant problem.
While there are multiple issues with this account, the password length is the most significant. Shorter passwords are inherently insecure
When you’re offboarding an employee, which of the following is the first thing you should do?
Audit their computer.
Disable accounts.
Delete accounts.
Disable accounts.
Disabling all accounts for the exiting user should happen immediately
Which of the following is a difference between TACACS and TACACS+?
TACACS uses UDP, TACACS+ uses TCP
TACACS uses TCP or UDP, TACACS+ uses UDP
TACACS uses UDP, TACACS+ uses UDP or TCP
TACACS uses UDP, TACACS+ uses UDP or TCP
TACACS+ can use TCP or UDP, though it is more common to use TCP. It should also be noted that TACACS+ is not backward compatible
Greg is considering using CHAP or MS-CHAPv2 for authenticating remote users. Which of the following is a major difference between the two protocols?
CHAP provides mutual authentication, MS-CHAPv2 does not.
CHAP uses AES for the challenge, MS-CHAPv2 uses a hash.
MS-CHAPv2 provides mutual authentication, CHAP does not.
MS-CHAPv2 provides mutual authentication, CHAP does not.
CHAP uses a hash, often MD5 for authentication, as does MS-CHAPv2. However, MS-CHAPv2 provides for mutual authentication, whereas CHAP only provides authenticating the client to the server
Terrance is looking for a physical access solution that uses asymmetric cryptography (public key cryptography) to authorize the user. What type of solution is this?
Asynchronous password token
Challenge response token
TOTP token
Challenge response token
With a challenge response token, the system will encrypt some value (often a random number) with the user’s public key. If the user’s token has the correct private key, it can decrypt the value that the system sent, and confirm that
Which access control model is based on the Trusted Computer System Evaluation Criteria (TCSEC)?
MAC
RBAC
DAC
DAC
Discretionary Access Control (DAC) is based on the Trusted Computer System Evaluation Criteria (TCSEC). The data owner has control over the access control
Mary is responsible for the security of database servers at a mortgage company. The servers are Windows Server 2016. She is concerned about file system security. Which of the following Microsoft features would be most helpful to her in implementing file system security?
EFS
Account lockout
UAC
EFS
While all of these features are important to security, the Encrypted File System (EFS) allows a person to easily encrypt any file or folder. This is important to file systems security
Santiago manages database security for a university. He is concerned about ensuring that appropriate security measures are implemented. Which of the following would be most important to database security?
Password policies
Antivirus
Access control policies
Access control policies
Access control is the most important issue for database security. It is critical that the principle of least privileges is adhered to and that each database user only has access to the data necessary to do his or her job