Exam 7: Identity and Access Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Fictional Corp has assigned each user within their Active Directory implementation a username. This username is a form of:

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

D

Otis wants to give a mobile app short-term access to a resource without having to store long-term user credentials (such as access keys) in the app. Which of the following describes the method he can use to do that?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

D

Bianca manages the e-mail server for Fictional Corp. All of the employees' e-mails are encrypted using the user's keys. One of the user's certificates expires, so a new certificate is installed. However, now they can no longer access their archived e-mails. Which of the following does Bianca need to do to give this user access to their archived e-mails?

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

D

Stan is walking past a row of cubicles when he notices someone's password written down on a sticky note that is attached to a monitor. The password is passwordpassword3. Besides the obvious problem of being the word password repeated followed by a single number, which of the following policies isn't in place that should be?

(Multiple Choice)
4.8/5
(34)

Sean has implemented an automatic account locking policy that will lock a user account after 5 invalid attempts. Which of the following types of attacks will this help thwart?

(Multiple Choice)
4.8/5
(37)

Nedra is assigning permissions to groups of users on the network for a new cloud-based application that she has just installed. Which of the following do her actions specifically enable?

(Multiple Choice)
4.8/5
(37)

Fred is trying to access the company's cloud-based CRM system while traveling abroad in Europe. He receives a message that access to this application is not allowed from the country he is currently in and lists the IP address detected by his connection. Which of the following factors of authentication is the CRM system using?

(Multiple Choice)
4.8/5
(38)

Cody suspects that his company has been the subject of an attack after reports from multiple users that they are missing files. He examines the logs and sees where it appears that the user logged in successfully for each of the users in question and that the strong encryption protocol was enforced and used each time. Which of the following may have occurred?

(Multiple Choice)
4.9/5
(36)

Lincoln is assigning permissions to users and groups for a new application that he is deploying. As he's doing this, which of the following principles should he make sure he follows?

(Multiple Choice)
4.8/5
(25)

Rose is implementing digital certificates for all of the users in her organization. Which of the following certificate types should she use?

(Multiple Choice)
4.8/5
(32)

Fictional Corp is trying out a new experimental technology that analyzes how users type as part of a multifactor authentication implementation. Which of the following categories of authentication factors would this fall into?

(Multiple Choice)
4.8/5
(32)

Alex is the network administrator for a Windows Server network. Which of the following is most likely in use to manage the users and other resources on that network?

(Multiple Choice)
4.8/5
(41)

Owen has been tasked with having multifactor authentication installed for entrances into the company's data center. Which of the following would meet that requirement?

(Multiple Choice)
5.0/5
(24)

Milo has set up smart cards for users in the company's main office. He wants to tie them into the authentication systems so that users can log into their workstations with them as well as access certain resources. Which of the following does he need to assign to each user in order to make this integration work?

(Multiple Choice)
4.8/5
(30)

Allen is visiting one of his client's data centers and, after signing in, is escorted through the premises the entire time. He notices that, in order to gain access to the data center, the employee had to swipe a proximity badge, key in a 6 digit code, and place his finger on a scanner. Which of the following describes the type of security that he just witnessed?

(Multiple Choice)
4.8/5
(33)

Kira needs to implement multifactor authentication for one of the new cloud applications. She needs to include something that you have and something that you know. Which of the following would meet those requirements? (Choose two.)

(Multiple Choice)
4.8/5
(30)

Sebastian is trying to access a resource that has been labeled as top secret, but he only has secret clearance. Which of the following access control methods does his organization use?

(Multiple Choice)
4.9/5
(31)

Steven has been tasked with planning the move from an infrastructure where administrators and users add permissions to resources individually to one where users are assigned to groups based upon the department they work in and what they do in the department and then assigning the groups to the resources. Which of the following has he been tasked with planning?

(Multiple Choice)
4.8/5
(42)

Caroline is trying to access one of her company's custom cloud-based web applications. She sees a bright red screen advising that there is a security problem with the site and that she should not trust the contents of it. Which of the following most likely occurred that an administrator should probably check first?

(Multiple Choice)
4.8/5
(36)

Andrew manages a variety of applications spread out between multiple cloud providers. Users can sign into any of the cloud applications with the same username and password. Which of the following has been implemented?

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 37
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)