Lesson 4 Review Questions Flashcards

(21 cards)

1
Q

A contractor only works for a company from 9 a.m. to 12 p.m. What kind of restriction could the company set up on the contractor’s account to prevent using it outside that range?

A. Location-based restrictions
B. Password restrictions
C. Time-based restrictions
D. Mandatory access control

A

Time-based restrictions

A time-based restriction would prevent access to corporate resources outside a set schedule. The company should set this account policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company needs to improve its security posture regarding credentials. Which security policy changes would implement the National Institute of Standards and Technology (NIST) updated guidelines?

A. Password reuse
B. Single-factor authentication
C. Multifactor authentication
D. Password history

A

Multifactor authentication

Multifactor authentication has taken place as the recommendation by NIST, coupled with decreasing complexity and age requirements. Additionally, it adds another layer to prevent malicious actors from gaining access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A recently hired information technology manager wants to implement more automation regarding the onboarding procedure. What process describes setting up accounts so a new employee can automatically access the software and file shares from the human resource platform?

A. Multifactor authentication
B. Following least privilege
C. Enabling a password reuse policy
D. Provisioning

A

Provisioning

Provisioning is the process of setting up a service according to a standard procedure or best practice checklist. Linking multiple systems together can increase the automation of onboarding procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company wants to set up single sign-on (SSO) without passing credentials through to each piece of software and cloud service. Which protocol would meet this requirement?

A. Kerberos
B. Fast IDentity Online
C. Virtual Private Network
D. Open Authorization

A

Open Authorization

The Open Authorization (OAuth) protocol is a system that facilitates the sharing of information (resources) within a user profile between sites. OAuth can be used to implement SSO by allowing users to log in once and access multiple applications without passing credentials through to each piece of software. OAuth can be integrated with other mechanisms to provide SSO capabilities and also supports OpenID Connect (OIDC) tokens to enhance identity verification when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An engineering firm wants to implement an authentication design that uses a framework for passwordless authentication. What statement is not accurate regarding passwordless authentication?

A. The user chooses either a roaming authenticator, such as a security key, or a platform authenticator implemented by the device OS.
B. The relying party uses a private key to verify the signature and authenticate the account session.
C. The user registers with a web application or service, referred to as a relying party.
D. When presented with an authentication challenge, the user performs the local gesture to unlock the private key.

A

The relying party uses a private key to verify the signature and authenticate the account session.

To the contrary, part of the passwordless authentication framework involves the relying party to use the public key, not private, to verify the signature and authenticate the account session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The chief information officer (CIO) tasked the network administrator with redeveloping the credential policy for the company. While working on the new policy, the chief executive officer (CEO) asked why having more than one factor to log into the computers was important. Why is just having a password not enough in today’s world?

A. Employees choose poor passwords
B. Employee passwords are always secure
C. Employees dislike using passwords
D. Employees choose strong passwords

A

Employees choose poor passwords

With the number of passwords people must remember and the various complexity requirements, people typically choose passwords that threat actors can easily crack and, unfortunately, reuse them across multiple services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An engineer for an information technology department needs to develop a metrics dashboard by pulling data from the ticketing system. What technology would the engineer need from the ticketing system to complete this project?

A. Application Programming Interface
B. Virtual Private Network
C. Lightweight Directory Access Protocol
D. Fast IDentity Online

A

Application Programming Interface

An Application Programming Interface (API) is a scripting method to expose a service, allowing other scripts or programs to use it. For example, an API enables software developers to access Transmission Control Protocol/Internet Protocol (TCP/IP) network stack functions under a particular operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A chief information security officer (CISO) wants to enhance the identity and access management security procedures in the company by adding an extra layer on top of the existing procedures. Which of the following would help achieve this objective by requiring verification through multiple methods or by tying authentication to a geographic area? (Select the two best options.)

A. Increase password length
B. Enable password history
C. Enforce multifactor authentication
D. Enable location-based authentication

A

-Enforce multifactor authentication
-Enable location-based authentication

Adding multifactor authentication (MFA) would have a greater impact on the company’s security posture. The CISO needs to consider which method of MFA is the most secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An employee travels out of the country for work but still needs to access the company’s shared drive. What would the information technology department need to set up on that employee’s computer to connect to the shared drive outside the office?

A. Mandatory access control
B. Virtual private network
C. Discretionary access control
D. Multifactor authentication

A

Virtual private network

Setting up a virtual private network (VPN) allows individuals to access corporate resources outside the corporate infrastructure. Without a VPN, employees cannot access a file share if they are not at their office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An employee traveling in Europe for vacation submitted a ticket as they could not access their work email. Which policy does the company use?

A. Password management
B. Password age
C. Multifactor authentication
D. Location-based authentication

A

Location-based authentication

Location-based access policies would need a temporary exemption option to allow for travel. Location-based access policies prevent access to company systems outside a specified area (typically the company’s state).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company is migrating its shared drives to a cloud repository service. While the majority of its drives use job titles for automated access, it has a few one-off project drives that it wants a specific owner to choose who has access to them. Which control type would fit these one-off drives?

A. Discretionary access control
B. Mandatory access control
C. Role-based access control
D. Multifactor authentication

A

Discretionary access control

The resource owner has primacy in a discretionary access control (DAC) model. Every resource has an owner who creates a file or service, although another user can receive ownership assignment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A real estate investment firm wants to implement Single Sign-On (SSO) for its dozens of services and software. The firm found a vendor to implement that request using the eXtensible Markup Language (XML) standard. What solution does this vendor use for SSO?

A. SAML
B. VPN
C. LDAP
D. LSASS

A

SAML

Security assertion markup language (SAML) allows for federating a network or cloud system. SAML assertions and claims between the principal, the relying party, and the identity provider use eXtensible Markup Language as their structure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One of the company’s accountants submitted a ticket stating they could not access a particular section of the accounting software. Why might the accountant not have access to every part of the accounting software?

A. Licensing
B. Discretionary access control
C. Mandatory access control
D. Least privilege

A

Least privilege

To increase the security posture of any given system, users should only have the necessary access (least privilege) to complete their work and nothing more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which technology replaced NT LAN Manager in Active Directory?

A. Kerberos
B. Virtual Private Network
C. Fast IDentity Online
D. Unique security identifier

A

Kerberos

The preferred system for network authentication in a Windows environment is Kerberos, which replaces the legacy system NT LAN Manager (NTLM) authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network administrator is cleaning up the company’s shared drive resources. Through an audit, the administrator discovered that the company did not properly manage the permissions over the years. Which control type should the administrator change the permissions to that gives access determined by the job?

A. Role-based access control
B. Multifactor authentication
C. Discretionary access control
D. Mandatory access control

A

Role-based access control

Role-based access control (RBAC) means an organization defines its permission requirements in terms of the tasks that an employee or service must be able to perform. Each set of permissions is a role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company using Windows Server technology needs to link its Active Directory to a third-party service to allow single sign-on. Which service that uses the standard X.500 would work for the company?

A. Virtual Private Network
B. Lightweight Directory Access Protocol
C. Application Programming Interface
D. Local Security Authority Subsystem Service

A

Lightweight Directory Access Protocol

Lightweight Directory Access Protocol (LDAP) is a protocol companies use for accessing network directory databases. LDAP stores information about authorized users, their privileges, and other organizational information.

17
Q

While developing a new security policy, the network administrator suggests to the chief information officer (CIO) that the company remove the password age portion. Why has having a password age policy caused issues for companies? (Select the two best options.)

A. Password age policies allow for more secure passwords.
B. Employees choose weak passwords when they need to change them frequently.
C. Employees follow best practices regarding passwords.
D. Employees leave passwords readily accessible in their work area.

A

-Employees choose weak passwords when they need to change them frequently
-Employees leave passwords readily accessible in their work area.

With the number of passwords people must remember and the various complexity requirements, people typically choose passwords that threat actors can easily crack and, unfortunately, reuse them across multiple services.

18
Q

During a recent audit, a company noticed a troubling trend where people had their passwords on sticky notes in their work area. The employees stated that the password policy made it too difficult to remember them. Which policy should the company change to alleviate this issue?

A. Password complexity
B. Password reuse
C. Password history
D. Password length

A

Password complexity

Modifying the password complexity policy to allow for longer but easily remembered passwords can aid in lowering the number of people saving their passwords insecurely.

19
Q

A manufacturing company recently bought out another similar company. They need to link each company’s directory systems together to access their resources without merging the two. How can they link the two directory systems together?

A. Site-to-site VPN
B. Migration
C. Federation
D. Location-based restrictions

A

Federation

Federation directories allow two different subsets of accounts to work together for permissions and access.

20
Q

Why might it be a bad policy to set up permissions individually instead of using an access control methodology?

A. It is harder to manage.
B. It allows for more control.
C. It allows for less control.
D. It is easier to manage.

A

It is harder to manage

Setting each permission individually may be an easier option if a file share is small. However, as file shares grow, maintaining this style of permissions can increase complexity.

21
Q

A small defense contractor is setting up a new shared drive system and needs the proper controls to ensure that only those with the correct classification can access any given folder or file. Which control type would meet these requirements?

A. Multifactor authentication
B. Role-based access control
C. Mandatory access control
D. Discretionary access control

A

Mandatory access control

Security clearance levels form the basis of mandatory access control (MAC). Rather than defining access control lists (ACLs) on resources, each object receives a classification label. Depending on the clearance level, a subject receives access to that resource.