Sample Test Questions Domain 5 Flashcards
Most directories follow a hierarchical database format, based on the ___ standard and a type of protocol, as in Lightweight Directory Access Protocol (LDAP), that allows subjects and applications to interact with the directory
X.500
___ technology can allow users to maintain a single password across multiple systems by transparently synchronizing the password to other systems and applications
Password synchronization
___ specifies the U.S. government standards for Personal Identity Verification (PIV), giving varying requirements of assurance
FIPS 201-2
A ___ gathers information about all the users and resources within an enterprise and stores them in a central virtual container
virtual directory
Providers of ___ allow their clients to have a form of SSO that works across various otherwise independent accounts for independent vendors. A common example is the ability to use a Google account to create a Facebook page
Identity as a Service (IDaaS)
controls should be ___ so that users and intruders do not know enough to be able to disable or bypass them
transparent
___ allows two or more organizations to share application security policies based upon their trust model
Extensible Access Control Markup Language (XACML)
A ___ specifies the access rights a certain subject possesses pertaining to specific objects
capability table
___ is a markup language that exchanges information about which users should get access to what resources and services
Service Provisioning Markup Language (SPML)
___ are commonly used to detect software faults, such as a process ending abnormally or hanging
watchdog timers
Neither TACACS+ nor RADIUS can carry out ___ functionality for devices that need to communicate over VoIP, mobile IP, or other similar types of protocols
authentication and authorization
when you open an application, a network portal might package your request and your authentication data in Security Assertion Markup Language (SAML) format and encapsulate that data into a ___ message
Simple Object Access Protocol (SOAP)
The ___ model looks at the shared resources that the different users of a system will use and tries to identify how information can be passed from a process working at a higher security clearance to a process working at a lower security clearance
Noninterference
Examples of ___ attacks against smart cards are fault generation, differential power analysis, electromagnetic analysis, timing, and software attacks. These types of attacks are used to uncover sensitive information about how a component works without trying to compromise any type of flaw or weakness, otherwise known as ___ attacks
side-channel; noninvasive
pharming uses ___ to redirect victims to a fake website
DNS poisoning