Lesson 8: Implementing Identity and Account Management Controls Flashcards

1
Q

Consider the challenges with providing privileged management and authorization on an enterprise network. Which of the following would the network system administrator NOT be concerned with when configuring directory services?

A. Confidentiality

B. Integrity

C. Non-repudiation

D. DoS

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examine the tradeoff between traditional password policy complexity requirements and updated practical suggestions from the National Institute of Standards and Technology (NIST) and select the statement that fits both practical password management and traditional complexity requirements.

A. Passwords should be easy to remember and can include spaces and repetitive strings of numbers (like 987654).

B. Passwords should be easy to remember, but should never use spaces.

C. Passwords should be written in a common password repository held secure by a member of the IT staff.

D. Passwords should not contain dictionary words or contextual information, such as a username or the company name.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A member of the IT team at a company launches a simulated phishing attack email to users across the organization. Which of these statements most accurately describes the purpose of such an attack?

A. The attack simulated an insider attack and alerted other members of the IT team to the presence of an attack.

B. The attack is a bug bounty, which identifies individuals in the organization who recognize the attack, who then make attempts to enhance security.

C. The attack identifies those users who respond to the phishing attempt as individuals who may require more training.

D. The attack prepares users for upcoming training, with users who respond appropriately, designated as teachers

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An employee has arrived to work and logged into the network with their smart card. This employee now has access to the company databases, email, and shared network resources. Evaluate all of the basic authorization policies and determine the policy best illustrated in this scenario.

A. Least privilege

B. Implicit deny

C. Single Sign-On (SSO)

D. Access key

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Many Internet companies, such as Google and Facebook, allow users to share a single set of credentials between multiple services providers. For example, a user could login to Amazon using their Facebook credentials. Which term correctly defines this example?

A. Federation

B. Single sign-on

C. Permission

D. Access control

A

A

Federation means the company trusts the accounts created and managed by a different network. The networks establish trust relationships, so the identity of a user (principal) from network A (identity provider), can be trusted as authentic by network B (service provider).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company is instituting role-based training. Which type of training will the company require the data owner to most likely complete?

A. Expert knowledge of IT security and network design

B. Training to ensure technical understanding of access controls

C. Training on data management and PII plus regulatory and compliance frameworks

D. Training on compliance issues and data classification systems

A

D

The data owner is responsible for data guardianship and training, for this role will focus on compliance issues and data classification systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Many access control models are rule-based. Consider how each of the following models determines how users receive rights and determine which model is NOT rule-based.

A. RBAC

B. DAC

C. MAC

D. ABAC

A

B

Discretionary Access Control (DAC) is not rule-based. DAC stresses the importance of the owner, who has full control over resources and can modify the Access Control List to grant rights to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An employee is working on a team to build a directory of systems they are installing in a classroom. The team is using the Lightweight Directory Access Protocol (LDAP) to update the X.500 directory. Utilizing the standards of an X.500 directory, which of the following distinguished names is the employee most likely to recommend?

A. OU=Univ,DC=local,CN=user,CN=system1

B. CN=system1,CN=user,OU=Univ,DC=local

C. CN=user,DC=local,OU=Univ,CN=system1

D. DC=system1,OU=Univ,CN=user,DC=local

A

B

A distinguished name is a unique identifier for any given resource within an X.500-like directory and made up of attribute=value pairs, separated by commas. The most specific attribute lists first, and then successive attributes become progressively broader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the most common, baseline account policies system administrators implement on a secure domain network? (Select all that apply.)

A. Use upper- and lower-case letters, numbers, and special characters for passwords.

B. Set a lockout duration period of 15 minutes.

C. Disable enforcement of a password history policy for unique passwords.

D. Use a shared account for administrative work on the network.

A

A,B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company’s clean desk policy will most likely feature which of the following clauses?

A. Employees must not use multiple tabs in a browser window.

B. Employees must keep their workplace tidy and professional in appearance.

C. Employees may not use personally-owned electronic devices in the office.

D. Employees must not leave documents unattended in their workspace.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement best describes the purpose of an acceptable use policy (AUP)?

A. An AUP governs how employees may use company equipment and internet services.

B. An AUP establishes ethical standards for employee behavior.

C. An AUP communicates a company’s values and expectations to its employees and customers.

D. An AUP defines security roles and training requirements for different types of employees.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Compare all of the functions within directory services and determine which statement accurately reflects the function of group memberships.

A. The key provided at authentication lists a user’s group memberships, which in turn allows certain access to resources on the network.

B. The system compares group memberships with the user’s logon credentials to determine if the user has access to the network resources.

C. Group memberships contain entries for all usernames and groups that have permission to use the resource.

D. Group memberships are like a database, where an object is similar to a record, and the attributes known about the object are similar to the fields.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows has several service account types, typically used to run processes and background services. Which of the following statements about service accounts is FALSE?

A. The Network service account and the Local service account have the same privileges as the standard user account.

B. Any process created using the system account will have full privileges over the local computer.

C. The local service account creates the host processes and starts Windows before the user logs on.

D. The Local Service account can only access network resources as an anonymous user.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An employee recently retired, and the employee received an exit interview, returned a company-issued laptop, and had company-specific programs and applications removed from a personal PC. Evaluate this employee’s offboarding process and determine what, if anything, remains to be done.

A. The offboarding process is complete; no further action is necessary.

B. IT needs to disable the employee’s user account and privileges.

C. IT needs to delete any company data encrypted with the employee’s key.

D. The employee must sign a nondisclosure agreement (NDA).

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Analyze and compare the access control models in terms of how Access Control Lists (ACL) are written and determine which statement accurately explains the Discretionary Access Control (DAC) model.

A. A DAC model is the most flexible and weakest access control model. Administrative accounts have control of the resource and grants rights to others.

B. A DAC model is the least flexible and strongest access control model. The owner has full control over the resource and grants rights to others.

C. A DAC model is the least flexible and strongest access control model. Administrative accounts have control of the resource and grant rights to others.

D. A DAC model is the most flexible and weakest access control model. The owner has full control over the resource and grants rights to others.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of employee training utilizes gaming and/or scenario-based techniques to emphasize training objectives? (Select all that apply.)

A. Capture the flag (CTF)

B. Computer-based training (CBT)

C. Phishing campaigns

D. Role-based training

A

A,B

17
Q

A network administrator regularly reviews group membership and access control lists for each resource. The administrator also looks for unnecessary accounts to disable. What is the administrator executing in this situation?

A. Recertification

B. Logging

C. Permission auditing

D. Usage auditing

A

C

18
Q

Analyze the following scenarios and determine which cases call for account disablement over account lockout. (Select all that apply.)

A. Audit logs reveal suspicious activity on a privileged user’s account.

B. A user’s company laptop and key fob are stolen at an airport.

C. A user enters an incorrect password multiple times.

D. A privileged user logs on to a company server outside of authorized hours.

A

A,B

19
Q

A system administrator has configured a security log to record unexpected behavior and review the logs for suspicious activity. Consider various types of audits to determine which type aligns with this activity.

A. Permission auditing

B. Usage auditing

C. Information security audit

D. Compliance audit

A

B

20
Q

Consider the role trust plays in federated identity management and determine which models rely on networks to establish trust relationships. (Select all that apply.)

A. SAML

B. OAuth

C. OpenID

D. LDAP

A

A,B,C

21
Q

A senior administrator is teaching a new technician how to properly develop a standard naming convention in Active Directory (AD). Examine the following responses and determine which statements would be sound advice for completing this task. (Select all that apply.)

A. Create as many root-level containers and nest containers as deeply as needed

B. Consider grouping Organizational Units (OU) by location or department

C. Build groups based on department, and keep all accounts, both standard and administrative, in the same group

D. Within each root-level Organizational Unit (OU), use separate child OUs for different types of objects

A

B,D