Question
Question 1 (2 points) Just-in-time (JIT) access is a feature of privileged access management (PAM) solutions where the privilege granted to access applications or systems
Question 1 (2 points)
Just-in-time (JIT) access is a feature of privileged access management (PAM) solutions where the privilege granted to access applications or systems is limited to predetermined periods of time, on an as-needed basis. Which type of authorization model is it ?
(Provide only the 4-letter acronym!)
Question 1 options:
Question 2 (2 points)
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
Question 2 options:
|
Transposition
|
|
Symmetric
|
|
Asymmetric
|
|
OTP (one-time pad)
|
Question 3 (2 points)
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
Question 3 options:
|
Asymmetric
|
|
OTP (one-time pad)
|
|
Hash
|
|
Symmetric
|
Question 4 (2 points)
Which of the following is not a component of access control?
Question 4 options:
|
Anonymization
|
|
Identification
|
|
Authorization
|
|
Authentication
|
Question 5 (2 points)
Access control aims at protecting information against improper disclosure and modification. It is applicable to cybersecurity and information security and doesn't include physical security.
Question 5 options:
True | |
False |
Question 6 (2 points)
Which of the following assertion is false?
Question 6 options:
|
An access control list is a list of permissions associated with a system resource.
|
|
Ciphertext is encrypted text.
|
|
Symmetric encryption is also called public key encryption.
|
|
An access control list is a list of permissions associated with a system resource.
|
Question 7 (2 points)
You are an IAM analyst and you want to grant access -to an employee within an organization- to the "HR/Payroll system" only if he is in the "HR" Department and only at the "Corporate Office" location. Mandatory access control model that requires the employee to be at the office is a good authorization model in this case.
Question 7 options:
True | |
False |
Question 8 (2 points)
What is the main limitation of an access control matrix ?
Question 8 options:
|
Size
|
|
Authorization rules
|
|
Subjects
|
|
Access control list
|
Question 9 (2 points)
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a type of security measure used to determine whether the user is a human or a malicious bot. Which type of authentication is it ?
Question 9 options:
|
Authentication based on inherence
|
|
Authentication based on knowledge
|
|
Authentication based on ownership
|
|
Challenge-response Authentication
|
Question 10 (2 points)
If a hash function is second pre-image resistant, then it is collision-resistant.
Question 10 options:
True | |
False |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started