Investigating identity

30 important questions on Investigating identity

What is the most common form of authentication that is most likely to be entered incorrectly?

De meest voorkomende form van authenticatie is wachtwoord invoeren.

When I purchase a new wireless access point, what should I do first?

Het default wachtwoord en ID veranderen

What type of factor authentication is a smart card?

Een smart card is Multi-factor authenticatie
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

How many factors is it if I have a password, PIN, and date of birth?

One Factor authenticatie

What authentication method can be used by two third parties that participate in a joint venture?

Federal  services authenticatie,  Federal services gebruikt saml om gegevens te versturen

What is an XML-based authentication protocol?

SAML is een XML gebasserde protocol. In een SAML kan bijvoorbeeld je ID of Personeelsnummer staan

What protocol is used to store and search for Active Directory objects?

LDAP, Light directory authenticatie protocl. Je gebruikt LDAP om computerobjecten of personen in AD te zoeken LDAP stored objcecten in x500 formaat

What is the format of a distinguished name for a user called Fred who works in the IT department for a company with a domain called Company A that is a dotcom?

Een distinguished name in ad wordt opgeslagen in x500 format. Het ziet eruit als
cn=Fred, ou=IT, dc=Company, dc=Com

What authentication factor uses tickets, timestamps, and updated sequence numbers and is used to prevent replay attacks?

Kerberos

Give two examples.How can I prevent a pass-the-hash attack?

1. Door kerberos te gebruiken
2. Disable NTLM

Name two AAA servers and the ports associated with them.

Remote authenticatie dial in (RADIUS) port: tcp 1813
Terminal access control control system plus ()CISCO TCACS : port tcp 49

What type of device is an iris scanner?

Een biometric device

What is Type II in biometric authentication and why is it a security risk?

Omdat dit FAlse acceptence rate (FAR) is en dit laat gebruikers door ongeacht of dit goed is

How many times can you use an HOTP password?
Is there a time restriction associated with it?

Een keer, nee

What is a port-based authentication that authenticates both users and devices?

IEE802.1x is port-based authentication that authenticates both users and devices

How many accounts should a system administrator for a multinational corporation have and why?

1 administrator account
1 user account

What do I need to do when I purchase a baby monitor and why?

De standaard login naam en wachtwoord veranderen

What is a privilege account?

Een account met veel rechten zoals een adminsitrator account

The system administrator in a multination corporation creates a user account using an employee's first name and last name. Why are they doing this time after time?

Om een account specifieke rechten te geven

What can I implement to find out immediately when a user is placed in a group that may give them a higher level of privilege?

A SIEM system can carry out active monitoring and notify the administrators of any changes to user accounts or logs

What will be the two possible outcomes if an auditor finds any working practices that do not confirm to the company policy?

Following an audit, either change management or a new policy will be put in place to rectify any area not conforming to company policy.

If a contractor brings in five consultants for two months of mail server migration, how should I set up their accounts?

De accounts moeten worden opgezet met een expiry date

If I have a company that has five consultants who work in different shift patterns, how can I set up their accounts so that each of them can only access the network during their individual shifts?

Via time management

A brute-force attack cracks a password using all combinations of characters and will eventually crack a password. What can I do to prevent a brute-force attack?

Door een wachtwoord limiet in te stellen

I have moved departments, but the employees in my old department still use my old account for access; what should the company have done to prevent this from happening?

Het bedrijf had het account moet disabelen

What is the purpose of the ssh-copy-id command?

Hiermee kan je een copy maken van een publieke ssh key en deze toevoegen aa nde lijst met geuathoriseerde keys

When I log in to my Dropbox account from my phone, I get an email asking me to confirm that this was a legal login. What have I been subjected to?

Twee factor authenticatie maar wel een risky twee factor

What is the purpose of a password vault and how secure is it?

Een wachtwoord vault is veilig omdat het beveiligd wordt door aes-256 maar een wachtwoord vault is net zo veilig als zn master password

What is a solution that helps protect privilege accounts?

Priviliged acces management (PAM)

Which authentication model gives access to a computer system even though the wrong credentials are being used?

Biometric authentication

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo