Investigating identity
30 important questions on Investigating identity
What is the most common form of authentication that is most likely to be entered incorrectly?
When I purchase a new wireless access point, what should I do first?
What type of factor authentication is a smart card?
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
How many factors is it if I have a password, PIN, and date of birth?
What authentication method can be used by two third parties that participate in a joint venture?
What is an XML-based authentication protocol?
What protocol is used to store and search for Active Directory objects?
What is the format of a distinguished name for a user called Fred who works in the IT department for a company with a domain called Company A that is a dotcom?
cn=Fred, ou=IT, dc=Company, dc=Com
What authentication factor uses tickets, timestamps, and updated sequence numbers and is used to prevent replay attacks?
Give two examples.How can I prevent a pass-the-hash attack?
2. Disable NTLM
Name two AAA servers and the ports associated with them.
Terminal access control control system plus ()CISCO TCACS : port tcp 49
What type of device is an iris scanner?
What is Type II in biometric authentication and why is it a security risk?
How many times can you use an HOTP password?
Is there a time restriction associated with it?
What is a port-based authentication that authenticates both users and devices?
How many accounts should a system administrator for a multinational corporation have and why?
1 user account
What do I need to do when I purchase a baby monitor and why?
What is a privilege account?
The system administrator in a multination corporation creates a user account using an employee's first name and last name. Why are they doing this time after time?
What can I implement to find out immediately when a user is placed in a group that may give them a higher level of privilege?
What will be the two possible outcomes if an auditor finds any working practices that do not confirm to the company policy?
If a contractor brings in five consultants for two months of mail server migration, how should I set up their accounts?
If I have a company that has five consultants who work in different shift patterns, how can I set up their accounts so that each of them can only access the network during their individual shifts?
A brute-force attack cracks a password using all combinations of characters and will eventually crack a password. What can I do to prevent a brute-force attack?
I have moved departments, but the employees in my old department still use my old account for access; what should the company have done to prevent this from happening?
What is the purpose of the ssh-copy-id command?
When I log in to my Dropbox account from my phone, I get an email asking me to confirm that this was a legal login. What have I been subjected to?
What is the purpose of a password vault and how secure is it?
What is a solution that helps protect privilege accounts?
Which authentication model gives access to a computer system even though the wrong credentials are being used?
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding