Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 (2 points) Just-in-time (JIT) access is a feature of privileged access management (PAM) solutions where the privilege granted to access applications or systems

Question 1 (2 points)

Just-in-time (JIT) access is a feature of privileged access management (PAM) solutions where the privilege granted to access applications or systems is limited to predetermined periods of time, on an as-needed basis. Which type of authorization model is it ?

(Provide only the 4-letter acronym!)

Question 1 options:

Question 2 (2 points)

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

Question 2 options:

Transposition

Symmetric

Asymmetric

OTP (one-time pad)

Question 3 (2 points)

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

Question 3 options:

Asymmetric

OTP (one-time pad)

Hash

Symmetric

Question 4 (2 points)

Which of the following is not a component of access control?

Question 4 options:

Anonymization

Identification

Authorization

Authentication

Question 5 (2 points)

Access control aims at protecting information against improper disclosure and modification. It is applicable to cybersecurity and information security and doesn't include physical security.

Question 5 options:

True
False

Question 6 (2 points)

Which of the following assertion is false?

Question 6 options:

An access control list is a list of permissions associated with a system resource.

Ciphertext is encrypted text.

Symmetric encryption is also called public key encryption.

An access control list is a list of permissions associated with a system resource.

Question 7 (2 points)

You are an IAM analyst and you want to grant access -to an employee within an organization- to the "HR/Payroll system" only if he is in the "HR" Department and only at the "Corporate Office" location. Mandatory access control model that requires the employee to be at the office is a good authorization model in this case.

Question 7 options:

True
False

Question 8 (2 points)

What is the main limitation of an access control matrix ?

Question 8 options:

Size

Authorization rules

Subjects

Access control list

Question 9 (2 points)

CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a type of security measure used to determine whether the user is a human or a malicious bot. Which type of authentication is it ?

Question 9 options:

Authentication based on inherence

Authentication based on knowledge

Authentication based on ownership

Challenge-response Authentication

Question 10 (2 points)

If a hash function is second pre-image resistant, then it is collision-resistant.

Question 10 options:

True
False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started