Questions for Domain 5: Identity & Access Management

  1. What access control method weighs additional factors, such as time of attempted access, before granting access?
    (a) Content-dependent access control
    (b) Context-dependent access control
    (c) Role-based access control
    (d) Task-based access control
  2. What service is known as cloud identity, which allows organisations to leverage cloud service for identity management?
    (a) IaaS
    (b) IDaaS
    (c) PaaS
    (d) SaaS
  3. What is an XML-based framework for exchanging security information, including authentication data?
    (a) Kerberos
    (b) OpenID
    (c) SAML
    (d) SESAME
  4. What protocol is a common open protocol for interfacing and querying directory service information provided by network operating systems using port 389 via TCP or UDP?
    (a) CHAP
    (b) LDAP
    (c) PAP
    (d) RADIUS
  5. What technique would raise the false accept rate (FAR) and lower the false
    reject rate (FRR) in a fingerprint scanning system?
    (a) Decrease the amount of minutiae that is verified
    (b) Increase the amount of minutiae that is verified
    (c) Lengthen the enrollment time
    (d) Lower the throughput time

Answers in comments

One thought on “Questions for Domain 5: Identity & Access Management

  1. Q1: (b) Context-dependent access control

    Q2: (b) IDaaS (identity as a service)

    Q3: (c) SAML

    Q4: (b) LDAP

    Q5: (a) Decrease the amount of minutiae that is verified (will make the accuracy of the system lower, which lowers false rejections but raises false acceptances)

    Like

Leave a reply to Chris Cancel reply

Design a site like this with WordPress.com
Get started