1What is the primary purpose of authentication in cyber security?
Authentication
Easy
A.To monitor network traffic
B.To verify a user's identity
C.To grant a user access to specific files
D.To encrypt data in transit
Correct Answer: To verify a user's identity
Explanation:
Authentication is the process of confirming that a user, device, or entity is who or what it claims to be. It answers the question, "Who are you?"
Incorrect! Try again.
2After a user is successfully authenticated, what is the next step that determines their level of access?
Authorization
Easy
A.Identification
B.Accounting
C.Auditing
D.Authorization
Correct Answer: Authorization
Explanation:
Authorization follows authentication. It is the process of giving an authenticated user permission to do something. It answers the question, "What are you allowed to do?"
Incorrect! Try again.
3Which network security appliance is designed to monitor and filter incoming and outgoing network traffic based on a set of security rules?
Network Security Appliances
Easy
A.Switch
B.Firewall
C.Router
D.Load Balancer
Correct Answer: Firewall
Explanation:
A firewall acts as a barrier between a trusted internal network and an untrusted external network (like the internet), controlling the flow of traffic.
Incorrect! Try again.
4What does the 'S' in HTTPS stand for?
Secure Communications
Easy
A.System
B.Standard
C.Secure
D.Service
Correct Answer: Secure
Explanation:
HTTPS stands for Hypertext Transfer Protocol Secure. The 'Secure' part indicates that the communication between your browser and the website is encrypted using SSL/TLS.
Incorrect! Try again.
5What is the process of creating a new user account and assigning it initial permissions called?
Identity Management
Easy
A.Authenticating
B.Provisioning
C.De-provisioning
D.Auditing
Correct Answer: Provisioning
Explanation:
Provisioning is a key part of the identity lifecycle management process that involves setting up accounts and access rights for new users.
Incorrect! Try again.
6A password is an example of which type of authentication factor?
Authentication
Easy
A.Something you have
B.Something you are
C.Something you know
D.Somewhere you are
Correct Answer: Something you know
Explanation:
Authentication factors are categorized into what you know (e.g., password, PIN), what you have (e.g., smart card, token), and what you are (e.g., fingerprint, retina scan).
Incorrect! Try again.
7The security principle that states a user should only have the minimum set of permissions required to perform their job is known as what?
Authorization
Easy
A.Principle of Least Privilege
B.Principle of Open Access
C.Principle of Full Authorization
D.Principle of Defense in Depth
Correct Answer: Principle of Least Privilege
Explanation:
The Principle of Least Privilege (PoLP) is a fundamental concept in information security that limits user access rights to the bare minimum they need to do their work.
Incorrect! Try again.
8What is a DMZ (Demilitarized Zone) in a network architecture?
B.A physical area where servers are kept under lock and key
C.A type of wireless network
D.A perimeter network that protects an organization's internal LAN from untrusted traffic
Correct Answer: A perimeter network that protects an organization's internal LAN from untrusted traffic
Explanation:
A DMZ is a buffer zone between the public internet and the private internal network. It hosts external-facing services like web and email servers, adding a layer of security.
Incorrect! Try again.
9What is the main function of a VPN (Virtual Private Network)?
Network Security Appliances
Easy
A.To automatically update system software
B.To increase the speed of an internet connection
C.To create a secure and encrypted connection over a less secure network, like the internet
D.To block advertisements on websites
Correct Answer: To create a secure and encrypted connection over a less secure network, like the internet
Explanation:
A VPN establishes a secure tunnel for your data, encrypting it to protect your privacy and security when using public networks.
Incorrect! Try again.
10What is the overall goal of an Identity and Access Management (IAM) system?
Implement Identity and Access Management
Easy
A.To detect viruses and malware on a computer
B.To design the physical layout of a network
C.To perform regular data backups
D.To manage user identities and control their access to resources
Correct Answer: To manage user identities and control their access to resources
Explanation:
IAM systems provide a framework to ensure that the right people have the right access to the right resources, at the right times, and for the right reasons.
Incorrect! Try again.
11What does LAN stand for?
Enterprise Network Architecture
Easy
A.Logical Access Node
B.Large Area Network
C.Limited Access Network
D.Local Area Network
Correct Answer: Local Area Network
Explanation:
A LAN is a network that connects computers and devices within a limited geographical area, such as a home, school, or office building.
Incorrect! Try again.
12What is the process of converting readable data (plaintext) into an unreadable format (ciphertext) called?
Secure Communications
Easy
A.Encryption
B.Hashing
C.Authentication
D.Decryption
Correct Answer: Encryption
Explanation:
Encryption is a fundamental technique for secure communication. It scrambles data so that only authorized parties can understand the information.
Incorrect! Try again.
13Using a password plus a one-time code from a mobile app is an example of:
Authentication
Easy
A.Multi-Factor Authentication (MFA)
B.Role-Based Access Control (RBAC)
C.Password-less Authentication
D.Single Sign-On (SSO)
Correct Answer: Multi-Factor Authentication (MFA)
Explanation:
MFA enhances security by requiring two or more different authentication factors. In this case, it's 'something you know' (password) and 'something you have' (the mobile app).
Incorrect! Try again.
14What is the process of removing a user's access rights when they leave an organization?
Identity Management
Easy
A.De-provisioning
B.Re-authentication
C.Provisioning
D.Onboarding
Correct Answer: De-provisioning
Explanation:
De-provisioning is the critical security process of revoking a user's credentials and access to systems, data, and facilities in a timely manner.
Incorrect! Try again.
15Which type of security system is designed to detect malicious activity and then send an alert, but not stop the activity itself?
Network Security Appliances
Easy
A.Intrusion Detection System (IDS)
B.Web Application Firewall (WAF)
C.Intrusion Prevention System (IPS)
D.Firewall
Correct Answer: Intrusion Detection System (IDS)
Explanation:
An IDS is a passive monitoring tool. It observes network traffic and logs or alerts on suspicious activity, whereas an Intrusion Prevention System (IPS) would actively block it.
Incorrect! Try again.
16Why is network segmentation a good security practice?
Secure Enterprise Network Architecture
Easy
A.It makes the network easier to physically cable
B.It limits the spread of an attack by containing it within a smaller part of the network
C.It makes the network faster for all users
D.It reduces the number of passwords users need to remember
Correct Answer: It limits the spread of an attack by containing it within a smaller part of the network
Explanation:
By dividing a network into smaller, isolated segments, an organization can prevent an intruder who compromises one segment from easily moving to others, thus limiting the damage.
Incorrect! Try again.
17In Role-Based Access Control (RBAC), how are permissions assigned to users?
Authorization
Easy
A.Permissions are assigned to roles, and users are then assigned to those roles
B.Permissions are based on the user's physical location
C.All users are given the same set of permissions
D.Permissions are assigned directly to each individual user
Correct Answer: Permissions are assigned to roles, and users are then assigned to those roles
Explanation:
RBAC simplifies administration by managing permissions for roles (like 'Accountant' or 'Sales Rep') rather than for every single user individually.
Incorrect! Try again.
18Which of these devices operates at the center of a star topology network, connecting all other devices?
Enterprise Network Architecture
Easy
A.Switch
B.Terminator
C.Bridge
D.Repeater
Correct Answer: Switch
Explanation:
In a modern star topology LAN, a central switch (or hub) connects all computers and network devices, allowing them to communicate with each other.
Incorrect! Try again.
19What does SSO stand for?
Implement Identity and Access Management
Easy
A.Single Sign-On
B.Standard Security Option
C.Secure System Object
D.System Service Operator
Correct Answer: Single Sign-On
Explanation:
Single Sign-On is an authentication scheme that allows a user to log in with a single ID and password to gain access to multiple, independent software systems.
Incorrect! Try again.
20A user's username, email address, and employee ID are all examples of:
Identity Management
Easy
A.Authentication factors
B.Attributes of a digital identity
C.Encryption keys
D.Network protocols
Correct Answer: Attributes of a digital identity
Explanation:
A digital identity is composed of various pieces of data, called attributes, that describe and uniquely identify an entity within a system.
Incorrect! Try again.
21A financial services company is upgrading its multi-factor authentication (MFA) system. To achieve the highest level of assurance, which combination of factors should be implemented for accessing sensitive customer data?
Authentication
Medium
A.Somewhere you are (geolocation) and something you have (software token)
B.Something you know (password) and something you have (hardware token)
C.Something you are (fingerprint scan) and something you know (complex password)
D.Something you have (SMS one-time password) and something you know (PIN)
Correct Answer: Something you are (fingerprint scan) and something you know (complex password)
Explanation:
This combination uses two distinct and strong factor types: inherence ('something you are') and knowledge ('something you know'). Biometric factors like fingerprints are generally considered stronger and harder to compromise than possession factors like tokens or SMS messages, which can be stolen or intercepted. Combining it with a complex password provides a very high level of security.
Incorrect! Try again.
22An organization uses a Role-Based Access Control (RBAC) model. An employee in the 'Accountant' role is temporarily assigned to a special audit project that requires read-only access to HR records. What is the most appropriate way to grant this access according to the principle of least privilege?
Authorization
Medium
A.Create a new role called 'Audit_Project_HR_Access' with the necessary permissions and assign it to the employee for the project's duration.
B.Modify the existing 'Accountant' role to include read-only access to HR records.
C.Temporarily add the employee to the 'HR_Manager' role.
D.Add the HR read-only permissions directly to the employee's user account.
Correct Answer: Create a new role called 'Audit_Project_HR_Access' with the necessary permissions and assign it to the employee for the project's duration.
Explanation:
Creating a new, specific role for the temporary task is the best practice. It adheres to the principle of least privilege by granting only the exact permissions needed. It is easily revocable without affecting their permanent 'Accountant' role, and it avoids modifying a standard role (which would grant unnecessary access to all other accountants) or a high-privilege role.
Incorrect! Try again.
23A company wants to host a public-facing web application server and a backend database server. To minimize the attack surface on the internal network, what is the best architectural placement for these servers?
Secure Enterprise Network Architecture
Medium
A.Place both the web server and database server in a Demilitarized Zone (DMZ).
B.Place the web server in the internal network and the database server in a DMZ.
C.Place both the web server and database server in the internal network.
D.Place the web server in a DMZ and the database server in the internal, secured network, with a firewall rule allowing only specific traffic from the web server.
Correct Answer: Place the web server in a DMZ and the database server in the internal, secured network, with a firewall rule allowing only specific traffic from the web server.
Explanation:
This is a classic three-tier architecture design. The web server, being publicly accessible, is placed in the semi-trusted DMZ. The database, containing sensitive data, remains in the highly trusted internal network. A firewall is configured to strictly control communication, only allowing the web server to query the database, thus protecting the database from direct external attacks.
Incorrect! Try again.
24Your company wants to allow employees to use their corporate Active Directory credentials to log into a third-party SaaS application like Salesforce. Which technology is designed to enable this kind of cross-domain, federated single sign-on (SSO)?
Identity Management
Medium
A.LDAP (Lightweight Directory Access Protocol)
B.Kerberos
C.RADIUS (Remote Authentication Dial-In User Service)
SAML is an open standard specifically designed for exchanging authentication and authorization data between an Identity Provider (like Active Directory) and a Service Provider (like Salesforce). It allows for secure web-based SSO across different security domains, which is the exact scenario described.
Incorrect! Try again.
25A security operations center (SOC) notices a surge in attacks targeting their web servers, specifically SQL Injection and Cross-Site Scripting (XSS). Which network security appliance should be deployed and configured to specifically inspect HTTP/HTTPS traffic and block these application-layer attacks?
B.A traditional stateful packet inspection firewall
C.A network Intrusion Detection System (IDS)
D.A Web Application Firewall (WAF)
Correct Answer: A Web Application Firewall (WAF)
Explanation:
A WAF is purpose-built to protect web applications by filtering and monitoring HTTP/HTTPS traffic between the internet and the application. It understands web protocols deeply and can identify and block specific attack patterns like SQLi and XSS, which a traditional firewall operating at lower layers cannot.
Incorrect! Try again.
26What is a fundamental difference in how TLS (Transport Layer Security) and IPsec in Tunnel Mode provide confidentiality for data transmitted over a network?
Secure Communications
Medium
A.TLS encrypts data at the Application Layer, while IPsec Tunnel Mode encrypts the entire IP packet at the Network Layer.
B.TLS only provides authentication, not encryption, while IPsec provides both.
C.TLS uses symmetric encryption, while IPsec Tunnel Mode uses asymmetric encryption for all data.
D.TLS operates at the Network Layer (Layer 3), while IPsec Tunnel Mode operates at the Transport Layer (Layer 4).
Correct Answer: TLS encrypts data at the Application Layer, while IPsec Tunnel Mode encrypts the entire IP packet at the Network Layer.
Explanation:
TLS operates above the Transport Layer (Layer 4) and encrypts the application payload (e.g., HTTP data). IPsec, in Tunnel Mode, operates at the Network Layer (Layer 3). It takes the entire original IP packet (header and payload), encrypts it, and encapsulates it within a new IP packet. This hides the original source and destination IP addresses from anyone snooping on the intermediate network.
Incorrect! Try again.
27A security audit reveals that many long-term employees have accumulated excessive permissions beyond their current job requirements, a phenomenon known as 'privilege creep'. Which IAM process is specifically designed to mitigate this issue?
Implement Identity and Access Management
Medium
A.User Provisioning
B.Access Certification and Recertification
C.Multi-Factor Authentication (MFA)
D.Federated Identity Management
Correct Answer: Access Certification and Recertification
Explanation:
Access certification is the process of periodically reviewing and validating user access rights. Managers or data owners are required to formally attest that their subordinates' or users' permissions are still necessary and appropriate for their job roles. This systematic review helps identify and remove excessive privileges, directly countering privilege creep.
Incorrect! Try again.
28An application's authentication token can be captured and re-sent by an attacker to gain unauthorized access. To mitigate this replay attack, the authentication protocol is being updated. Which of the following additions would be most effective?
Authentication
Medium
A.Enforcing a stricter password complexity policy for users.
B.Increasing the token's encryption strength from AES-128 to AES-256.
C.Hashing the user's password using a stronger algorithm like bcrypt.
D.Including a unique, single-use number (nonce) or a timestamp in each authentication request.
Correct Answer: Including a unique, single-use number (nonce) or a timestamp in each authentication request.
Explanation:
Replay attacks work by re-using a valid, captured transmission. A nonce (number used once) or a timestamp with a short validity window ensures that each authentication request is unique. The server can then reject any request with a nonce it has already seen or a timestamp that is too old, effectively preventing the captured token from being replayed successfully.
Incorrect! Try again.
29A large, dynamic organization with many contractors needs a highly granular access control system. Decisions must be based on real-time context, such as user location, time of day, and the data's sensitivity level. Which access control model best supports these requirements?
Authorization
Medium
A.Discretionary Access Control (DAC)
B.Role-Based Access Control (RBAC)
C.Attribute-Based Access Control (ABAC)
D.Mandatory Access Control (MAC)
Correct Answer: Attribute-Based Access Control (ABAC)
Explanation:
ABAC makes authorization decisions by evaluating rules against the attributes of the user, the resource, and the environment. This is far more flexible and granular than RBAC, which is based on static roles. ABAC is ideal for complex, dynamic environments where context (like location, time, or device type) is crucial for making access decisions.
Incorrect! Try again.
30In the Cisco three-tier hierarchical network model, what is the primary function of the Distribution Layer?
Enterprise Network Architecture
Medium
A.To act as the demarcation point between the enterprise network and the internet.
B.To connect end-user devices, like workstations and printers, to the network.
C.To aggregate traffic from the Access Layer and enforce network policies like routing between VLANs and access control lists.
D.To provide high-speed, non-blocking packet switching for the network backbone.
Correct Answer: To aggregate traffic from the Access Layer and enforce network policies like routing between VLANs and access control lists.
Explanation:
The Distribution Layer serves as the crucial link between the Access Layer (where users connect) and the Core Layer (the high-speed backbone). Its main responsibilities include aggregating wiring closets, defining broadcast domains, providing routing between Virtual LANs (VLANs), and applying security policies with Access Control Lists (ACLs).
Incorrect! Try again.
31During a routine security audit, an administrator discovers several active user accounts for employees who left the company months ago. This security risk is a direct failure of which identity lifecycle management phase?
Identity Management
Medium
A.Authentication
B.Authorization
C.De-provisioning
D.Provisioning
Correct Answer: De-provisioning
Explanation:
De-provisioning is the process of revoking a user's access to systems, applications, and data when their employment is terminated or their role changes. The presence of these 'orphan accounts' clearly indicates a failure in the de-provisioning workflow, as the accounts were not disabled or deleted in a timely manner.
Incorrect! Try again.
32What is the primary security benefit of implementing network segmentation using VLANs and firewalls in a corporate environment?
Secure Enterprise Network Architecture
Medium
A.It increases the overall bandwidth available to end-users.
B.It simplifies the IP addressing scheme across the organization.
C.It encrypts all traffic flowing between the network segments.
D.It contains security breaches by preventing lateral movement between different network segments.
Correct Answer: It contains security breaches by preventing lateral movement between different network segments.
Explanation:
Network segmentation divides a larger network into smaller, isolated sub-networks (segments). If an attacker compromises a host in one segment (e.g., Guest Wi-Fi), segmentation rules enforced by firewalls or ACLs will prevent them from easily moving 'laterally' to access critical resources in another segment (e.g., the Finance department servers). This containment is a core principle of defense-in-depth.
Incorrect! Try again.
33In a Microsoft Active Directory environment, how does the Kerberos protocol fundamentally differ from a protocol like RADIUS for service authentication?
Authentication
Medium
A.Kerberos is a centralized AAA protocol, while RADIUS is decentralized.
B.RADIUS encrypts the entire authentication packet, while Kerberos only encrypts the password.
C.Kerberos uses a ticket-granting system (TGT and Service Tickets) to provide access to multiple services after an initial login, whereas RADIUS re-authenticates for each service.
D.Kerberos is designed for network access control (like Wi-Fi), while RADIUS is used for file server access.
Correct Answer: Kerberos uses a ticket-granting system (TGT and Service Tickets) to provide access to multiple services after an initial login, whereas RADIUS re-authenticates for each service.
Explanation:
The core feature of Kerberos is its use of tickets. After a user authenticates once to the Key Distribution Center (KDC), they receive a Ticket-Granting Ticket (TGT). This TGT can then be used to request service tickets for various network resources without re-entering a password. RADIUS, a client-server protocol, typically requires the client to interact with the server for each authentication and authorization decision.
Incorrect! Try again.
34What key capability allows a Next-Generation Firewall (NGFW) to create more granular security policies than a traditional stateful firewall?
Network Security Appliances
Medium
A.The ability to maintain a state table of active connections.
B.The ability to filter traffic based on source and destination IP addresses and ports.
C.The ability to perform deep packet inspection (DPI) to identify and control specific applications (e.g., Facebook, YouTube) regardless of the port used.
D.The ability to perform Network Address Translation (NAT).
Correct Answer: The ability to perform deep packet inspection (DPI) to identify and control specific applications (e.g., Facebook, YouTube) regardless of the port used.
Explanation:
While traditional stateful firewalls operate primarily at Layers 3 and 4 (IP addresses and ports), NGFWs add Layer 7 (Application Layer) awareness. Through Deep Packet Inspection (DPI), an NGFW can identify the specific application generating the traffic, allowing administrators to create policies like "Allow general web traffic but block BitTorrent," even if BitTorrent attempts to run over port 80 (HTTP).
Incorrect! Try again.
35An employee needs to connect their laptop to the corporate network over an untrusted public Wi-Fi network. They must ensure that all their network traffic (web, email, etc.) is securely encrypted between their laptop and the corporate gateway. Which technology is most suitable for this purpose?
Secure Communications
Medium
A.Using HTTPS for all web browsing.
B.Connecting to the office file server via SSH File Transfer Protocol (SFTP).
C.Establishing a Virtual Private Network (VPN) connection to the corporate firewall.
D.Configuring a SOCKS proxy in their web browser.
Correct Answer: Establishing a Virtual Private Network (VPN) connection to the corporate firewall.
Explanation:
A VPN is specifically designed to create a secure, encrypted tunnel over an untrusted network. It captures all network traffic from the client device and sends it through this tunnel to the corporate network, effectively making the remote device a secure part of the internal network. Options like HTTPS or SFTP only secure specific application traffic, not all traffic.
Incorrect! Try again.
36A company's file server uses a Discretionary Access Control (DAC) model. A user in the engineering department creates a sensitive design document and, to collaborate, grants read/write permissions to a colleague in marketing. This action, while allowed by the system, violates company policy. This scenario highlights which inherent weakness of DAC?
Authorization
Medium
A.DAC requires security labels on all objects, which is difficult to maintain.
B.DAC does not allow users to share files with colleagues.
C.DAC is too complex to manage for a large number of users.
D.Access control is determined by the data owner, which may not align with organizational security policy.
Correct Answer: Access control is determined by the data owner, which may not align with organizational security policy.
Explanation:
The defining characteristic of DAC is that the owner of an object (the user who created it) has the discretion to grant access to others. While this is flexible, it's also a weakness in a corporate setting because an individual's decision might conflict with the organization's broader data handling and security policies. Models like MAC or RBAC enforce centrally managed policies, preventing such violations.
Incorrect! Try again.
37A rapidly growing company is automating its onboarding process. When a new employee's data is entered into the HR system, an account should be automatically created in Active Directory, a mailbox set up in Office 365, and access granted to the company portal. What is the correct IAM term for this automated process?
Identity Management
Medium
A.Authentication
B.Federation
C.Provisioning
D.Attestation
Correct Answer: Provisioning
Explanation:
Provisioning is the identity management process of creating, updating, and maintaining user accounts and their access privileges across various systems. The scenario describes the automated creation and setup of a new digital identity and its necessary resources, which is the core function of user provisioning.
Incorrect! Try again.
38An organization is adopting a Zero Trust security model. A security review finds that any device connected to the internal wired network is automatically trusted and can attempt to connect to the internal finance server without re-authentication or posture checking. Which core principle of Zero Trust does this configuration violate?
Secure Enterprise Network Architecture
Medium
A.Enforce the principle of least privilege.
B.Encrypt all communications.
C.Never trust, always verify.
D.Implement network segmentation.
Correct Answer: Never trust, always verify.
Explanation:
The core tenet of a Zero Trust model is to eliminate the outdated concept of a trusted internal network and an untrusted external network. The principle 'Never trust, always verify' means that every access request must be authenticated, authorized, and encrypted, regardless of where it originates. The existing configuration violates this by implicitly trusting any device on the internal network.
Incorrect! Try again.
39A company is designing a Wide Area Network (WAN) to connect its headquarters to several branch offices. They require a solution that provides Quality of Service (QoS) guarantees for VoIP traffic and separates their traffic from other customers on the provider's network. Which WAN technology is best suited for these requirements?
MPLS is a provider-managed technology that creates private, virtual circuits across its backbone. It is known for its ability to provide strong Service Level Agreements (SLAs) and Quality of Service (QoS) by prioritizing traffic types (like voice over data). It inherently separates customer traffic, making it a superior choice for enterprise WANs that need performance guarantees, compared to the variable nature of the public internet.
Incorrect! Try again.
40What is the primary security advantage of implementing a centralized Identity and Access Management (IAM) solution, such as Active Directory or Okta, compared to managing local user accounts on each individual server and application?
Implement Identity and Access Management
Medium
A.It eliminates the need for users to remember passwords by enabling passwordless authentication on all systems.
B.It allows for the consistent enforcement of security policies (e.g., password complexity, MFA) and simplified access revocation from a single point of control.
C.It reduces the cost of server hardware by requiring fewer domain controllers.
D.It guarantees that all applications will have 100% uptime.
Correct Answer: It allows for the consistent enforcement of security policies (e.g., password complexity, MFA) and simplified access revocation from a single point of control.
Explanation:
A centralized IAM system acts as the single source of truth for user identities and access rights. This allows administrators to define a security policy once and have it apply everywhere. Most importantly, when an employee leaves, their access can be revoked globally from one console, drastically reducing the risk of orphan accounts and unauthorized access compared to the error-prone process of logging into dozens of individual systems to disable separate accounts.
Incorrect! Try again.
41An attacker has successfully compromised a Domain Controller and extracted the NTLM hash of the KRBTGT account. Which of the following Kerberos attacks can they now execute, and what is its primary characteristic?
Authentication
Hard
A.Silver Ticket Attack, allowing the attacker to forge Ticket-Granting Service (TGS) tickets for a specific service on a specific server.
B.Pass-the-Hash Attack, allowing the attacker to authenticate as the KRBTGT user to any service in the domain.
C.Golden Ticket Attack, allowing the attacker to forge Ticket-Granting Tickets (TGTs) for any user with arbitrary lifetimes.
D.Kerberoasting, allowing the attacker to crack the plaintext password of the KRBTGT account offline.
Correct Answer: Golden Ticket Attack, allowing the attacker to forge Ticket-Granting Tickets (TGTs) for any user with arbitrary lifetimes.
Explanation:
The KRBTGT account is used by the Key Distribution Center (KDC) to encrypt and sign all TGTs in a domain. Possessing its NTLM hash allows an attacker to create their own valid TGTs for any user, with any group memberships, and for any duration. This is known as a Golden Ticket attack. A Silver Ticket requires the hash of a service account, not KRBTGT. Pass-the-Hash is a different technique, and Kerberoasting targets service accounts, not the KRBTGT account which has a complex, machine-generated password making it impractical to crack.
Incorrect! Try again.
42A Single Page Application (SPA) is using OAuth 2.0 for authorization. The security team wants to mitigate the risk of authorization code interception by malicious clients on the user's device. Which grant type and extension combination provides the best protection against this specific threat?
Authorization
Hard
A.Resource Owner Password Credentials Grant over HTTPS.
B.Authorization Code Grant with Proof Key for Code Exchange (PKCE).
C.Implicit Grant with strict redirect_uri validation.
D.Client Credentials Grant with mTLS.
Correct Answer: Authorization Code Grant with Proof Key for Code Exchange (PKCE).
Explanation:
The Authorization Code Grant with PKCE (RFC 7636) is specifically designed to prevent authorization code interception attacks. The client generates a code_verifier and a code_challenge. The challenge is sent in the initial request, and the verifier is sent in the token exchange request. The server validates that they match. This ensures that even if an attacker intercepts the authorization code, they cannot exchange it for a token without the code_verifier. The Implicit Grant is deprecated due to security risks like token leakage. Client Credentials and Resource Owner Password grants are unsuitable for this public client (SPA) scenario.
Incorrect! Try again.
43In a Zero Trust architecture, a security architect is deciding on the primary enforcement point for east-west traffic between microservices running in a Kubernetes cluster. Which of the following provides the most granular, cryptographically-verifiable, and application-aware control?
Secure Enterprise Network Architecture
Hard
A.A service mesh (e.g., Istio, Linkerd) enforcing mutual TLS (mTLS) and Layer-7 policies between pods.
B.Kubernetes NetworkPolicies to control traffic flow at the IP address and port level.
C.Network ACLs (NACLs) at the VPC subnet level to filter traffic based on IP ranges.
D.A traditional next-generation firewall (NGFW) virtual appliance inspecting all inter-subnet traffic.
Correct Answer: A service mesh (e.g., Istio, Linkerd) enforcing mutual TLS (mTLS) and Layer-7 policies between pods.
Explanation:
A service mesh operates at Layer 7 and can enforce identity-based security policies using strong cryptographic identities provided by mTLS. This is more granular than IP-based controls like Kubernetes NetworkPolicies or NACLs. It can inspect and control traffic based on application-level attributes (e.g., HTTP methods, gRPC calls) for individual pods, which aligns perfectly with Zero Trust principles for east-west traffic. A traditional NGFW would struggle with the ephemeral nature of pod IPs and would lack the application-context that a service mesh provides natively within the cluster.
Incorrect! Try again.
44A Web Application Firewall (WAF) and a Next-Generation Firewall (NGFW) with deep packet inspection (DPI) are deployed in-line. An attacker attempts a blind SQL injection attack where the malicious SQL payload is embedded within a Base64-encoded parameter in an HTTPS POST request. Why is the WAF generally more effective at detecting and blocking this specific attack?
Network Security Appliances
Hard
A.The NGFW cannot inspect encrypted HTTPS traffic, so the payload remains invisible to it.
B.The NGFW's DPI engine is optimized for network protocols and signatures, not complex application-layer encoding schemes.
C.The WAF is designed to terminate the TLS session, decode application-specific encodings like Base64, and analyze the application logic (e.g., SQL syntax).
D.The WAF operates at a higher OSI layer (Layer 7) than the NGFW (Layer 4), inherently giving it better visibility.
Correct Answer: The WAF is designed to terminate the TLS session, decode application-specific encodings like Base64, and analyze the application logic (e.g., SQL syntax).
Explanation:
While both appliances can perform TLS inspection, the key differentiator is the depth of application awareness. A WAF is purpose-built to understand web application protocols and logic. It can terminate TLS, parse HTTP requests, decode parameter encodings (like Base64, URL encoding), and then apply sophisticated rules that understand SQL, XSS, and other web attack patterns. An NGFW's DPI is typically more focused on identifying malware, protocol anomalies, and known exploit signatures at the network and transport layers, and is less specialized in decoding complex, nested application-layer data formats.
Incorrect! Try again.
45A large enterprise is merging two organizations. Org A uses on-premises Active Directory Federated Services (ADFS). Org B uses Azure Active Directory. The goal is to allow users from Org B to seamlessly access legacy, on-premises SAML applications in Org A without migrating all identities. What is the most appropriate federation strategy to achieve this with minimal disruption?
Identity Management
Hard
A.Configure Azure AD as a Claims Provider Trust in Org A's ADFS. Users from Org B will authenticate against Azure AD, which then issues a token that ADFS trusts and uses to issue its own token for the legacy apps.
B.Configure each legacy SAML application in Org A to trust Azure AD as a second, separate Identity Provider (IdP).
C.Deploy Azure AD Connect in Org B to synchronize its identities to Org A's on-premises Active Directory.
D.Establish a one-way forest trust from Org A's AD to Org B's Azure AD Domain Services.
Correct Answer: Configure Azure AD as a Claims Provider Trust in Org A's ADFS. Users from Org B will authenticate against Azure AD, which then issues a token that ADFS trusts and uses to issue its own token for the legacy apps.
Explanation:
This approach correctly establishes a chain of trust. ADFS (the IdP for the legacy apps) is configured to trust Azure AD as an external IdP. When a user from Org B tries to access an app, ADFS redirects them to Azure AD for authentication. Azure AD authenticates the user and sends a SAML token back to ADFS. ADFS validates this token and then issues its own SAML token, which the legacy application trusts. This avoids complex identity synchronization, forest trusts (which aren't directly applicable to Azure AD), and reconfiguring dozens of individual applications.
Incorrect! Try again.
46A security audit of a VPN gateway reveals it is configured to use IPsec in Transport Mode for site-to-site communication between two corporate networks. What is the primary security flaw or limitation of this configuration compared to the standard practice?
Secure Communications
Hard
A.Transport Mode encapsulates the entire original packet in a new IP packet, which is unnecessary for site-to-site communication.
B.Transport Mode is less performant than Tunnel Mode due to higher cryptographic overhead per packet.
C.Transport Mode only encrypts the payload of the IP packet, leaving the original IP headers (source and destination IPs) exposed, which leaks network topology information.
D.Transport Mode does not work with Network Address Translation (NAT) and is therefore unsuitable for traversing the internet.
Correct Answer: Transport Mode only encrypts the payload of the IP packet, leaving the original IP headers (source and destination IPs) exposed, which leaks network topology information.
Explanation:
IPsec has two modes: Transport and Tunnel. Transport Mode encrypts/authenticates only the IP payload (e.g., the TCP segment). The original IP header remains intact. This is efficient for host-to-host communication on the same network but is a security risk for a site-to-site VPN because it exposes the internal IP addresses of the communicating hosts to anyone monitoring traffic between the gateways. Tunnel Mode, the standard for site-to-site VPNs, encapsulates the entire original IP packet within a new IP packet, protecting the original headers and hiding the internal network topology.
Incorrect! Try again.
47A company is implementing a Conditional Access Policy in their IdP. The policy is defined as: IF user.group == 'Admins' AND location.ip != 'Trusted_HQ_IP' AND device.isCompliant == true THEN GRANT access WITH mfa. Which of the following scenarios represents a logical flaw or a significant gap in this policy?
Implement Identity and Access Management
Hard
A.A regular user on a compliant device outside the trusted IP range is blocked from accessing resources.
B.An administrator on a non-compliant device inside the Trusted HQ IP range can access resources without an MFA prompt.
C.An administrator on a compliant device outside the trusted IP range is correctly prompted for MFA.
D.An administrator on a non-compliant device outside the trusted IP range is denied access.
Correct Answer: An administrator on a non-compliant device inside the Trusted HQ IP range can access resources without an MFA prompt.
Explanation:
The policy logic uses a series of AND conditions. For the policy to trigger, all conditions must be met: the user must be an admin, the location must be outside HQ, and the device must be compliant. The scenario described (Admin, inside HQ, non-compliant device) fails the location.ip != 'Trusted_HQ_IP' condition. Therefore, this policy rule does not apply, and access would be determined by the default or next policy. If the default is to allow access, this creates a significant security gap where an admin can use a potentially compromised, non-compliant device to access resources without MFA, simply because they are physically on the corporate network.
Incorrect! Try again.
48When comparing Time-based One-Time Password (TOTP) and FIDO2/WebAuthn as MFA factors, what is the core cryptographic reason FIDO2 offers superior protection against real-time, man-in-the-middle phishing attacks?
Authentication
Hard
A.The FIDO2 private key never leaves the secure hardware authenticator, whereas the TOTP shared secret can be phished from the user.
B.FIDO2 uses asymmetric cryptography (public/private keys), which is inherently more secure than the symmetric cryptography (shared secret) used by TOTP.
C.FIDO2 authenticators sign a challenge that includes the origin (domain name) of the requesting site, making the signature invalid for a phishing site even if the user approves it.
D.FIDO2 requires a user gesture (like a touch), which prevents automated attacks, while TOTP codes can be entered by bots.
Correct Answer: FIDO2 authenticators sign a challenge that includes the origin (domain name) of the requesting site, making the signature invalid for a phishing site even if the user approves it.
Explanation:
While the other options are true aspects of FIDO2, they don't fully explain its anti-phishing strength. The critical element is origin binding. During registration, the authenticator associates the generated key pair with the specific website's domain (the origin). During authentication, the website (relying party) sends a challenge that includes its origin. The authenticator will only sign this challenge with the correct private key if the origin matches the one stored during registration. A phishing site (evil-corp.com) cannot get a valid signature for a credential registered for good-corp.com. Even if a user is tricked into interacting with the phishing site, the cryptographic challenge-response will fail, preventing the attack. A user can be tricked into entering a valid TOTP code on a phishing site, which the attacker can then immediately relay to the real site.
Incorrect! Try again.
49An API gateway is configured to validate JWTs. An access token is presented with the following claims: {"iss": "https://idp.example.com", "sub": "user123", "aud": "api.service-A.com", "scope": "read:data write:data"}. The request is for the endpoint https://api.service-B.com/data. The gateway's validation logic correctly verifies the signature and issuer (iss), but the request is still insecurely processed. What is the most likely validation step that was missed?
Authorization
Hard
A.The gateway failed to check the scope claim to ensure the user has permission to access the data.
B.The gateway failed to validate the exp (Expiration) claim, allowing a stale token to be used.
C.The gateway failed to validate the aud (Audience) claim. The token was intended for service-A, not service-B.
D.The gateway failed to validate the sub (Subject) claim, leading to an incorrect user identity being assumed.
Correct Answer: The gateway failed to validate the aud (Audience) claim. The token was intended for service-A, not service-B.
Explanation:
The aud (Audience) claim is a critical security control that specifies the intended recipient(s) of the token. In this case, the token was explicitly issued for api.service-A.com. If service-B accepts this token without verifying that it is in the audience, it creates a confused deputy vulnerability. An attacker could use a token obtained for a less sensitive service (A) to access a more sensitive service (B). Verifying issuer, signature, and expiration are necessary, but ignoring the audience is a common and severe implementation flaw.
Incorrect! Try again.
50A security team is deciding between using a dedicated network TAP or a switch's SPAN (Switched Port Analyzer) port to forward traffic to an Intrusion Detection System (IDS) for forensic analysis. For ensuring the highest fidelity of captured data, especially during a high-throughput Distributed Denial-of-Service (DDoS) attack, why is a network TAP the superior choice?
Network Security Appliances
Hard
A.A network TAP can inject traffic back into the network to actively block threats, which a SPAN port cannot.
B.A SPAN port can only mirror traffic from a single source port, while a TAP can aggregate traffic from multiple network segments.
C.A network TAP is a passive device that creates an exact copy of all traffic, including physical layer errors, whereas a SPAN port may drop packets under heavy load as the SPAN process is a low-priority task for the switch's CPU.
D.A SPAN port introduces significant latency to the production network link, while a TAP operates with zero latency.
Correct Answer: A network TAP is a passive device that creates an exact copy of all traffic, including physical layer errors, whereas a SPAN port may drop packets under heavy load as the SPAN process is a low-priority task for the switch's CPU.
Explanation:
The core function of a switch is to forward production traffic. The process of copying packets to a SPAN port is a secondary, lower-priority task. Under heavy load, such as a DDoS attack, the switch will prioritize its primary forwarding function and may drop SPAN packets to conserve resources. This results in an incomplete and unreliable data stream for the IDS. A network TAP is a fail-safe hardware device that sits in-line and creates a perfect, bit-for-bit copy of all traffic without being affected by network load. It ensures the security appliance sees every single packet, which is critical for accurate detection and forensic analysis.
Incorrect! Try again.
51When migrating from a traditional three-tier (core, distribution, access) network architecture to a spine-leaf architecture, what is the most significant challenge from a security policy enforcement perspective?
Enterprise Network Architecture
Hard
A.The increased number of physical connections makes cable management and physical security more complex.
B.The higher bandwidth capabilities of spine-leaf fabrics make it difficult for security appliances to keep up with the traffic flow.
C.The proliferation of east-west traffic, which now bypasses traditional centralized firewalls (choke points) that were typically placed at the distribution or core layer.
D.Spine-leaf architectures typically use proprietary protocols, leading to vendor lock-in for security appliances.
Correct Answer: The proliferation of east-west traffic, which now bypasses traditional centralized firewalls (choke points) that were typically placed at the distribution or core layer.
Explanation:
In a three-tier architecture, traffic between different access layer switches (east-west) often has to travel 'up' to the distribution or core layer to be routed. This creates natural choke points to place firewalls for inspection. In a spine-leaf fabric, any leaf switch is only one hop away from any other leaf switch via a spine. This is excellent for performance and low latency but means that a significant amount of east-west traffic can flow between racks without ever passing through a centralized firewall. This necessitates a shift towards a distributed security model, such as micro-segmentation with host-based firewalls or fabric-integrated security services, which can be more complex to manage.
Incorrect! Try again.
52A web server's TLS configuration supports the cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA. A security scanner flags this as weak due to the use of CBC mode. What specific, well-known attack is associated with CBC mode in TLS 1.2 and earlier, even when using a modern key exchange like ECDHE?
Secure Communications
Hard
A.The BEAST (Browser Exploit Against SSL/TLS) attack, which exploits a vulnerability in how CBC's initialization vectors (IVs) were chosen and chained.
B.The Logjam attack, which is a downgrade attack targeting the Diffie-Hellman key exchange.
C.The Heartbleed attack, which was a memory disclosure vulnerability in the OpenSSL library's heartbeat extension.
D.The CRIME attack, which uses data compression to leak information from the encrypted session.
Correct Answer: The BEAST (Browser Exploit Against SSL/TLS) attack, which exploits a vulnerability in how CBC's initialization vectors (IVs) were chosen and chained.
Explanation:
BEAST is a client-side attack against TLS 1.0 and earlier that exploits a weakness in the Cipher Block Chaining (CBC) mode of operation. Specifically, it leverages the fact that the IV for each record was predictable (it was the last ciphertext block of the previous record). While modern browsers have client-side mitigations, and TLS 1.1/1.2 introduced server-side mitigations, the fundamental cryptographic weakness lies with CBC in these older protocols. The most robust solution is to prioritize Authenticated Encryption with Associated Data (AEAD) ciphers like AES_GCM. Heartbleed, Logjam, and CRIME are different types of TLS vulnerabilities not directly related to the CBC implementation itself.
Incorrect! Try again.
53A company wants to automate user lifecycle management for its SaaS applications. They are evaluating Just-In-Time (JIT) provisioning versus using the System for Cross-domain Identity Management (SCIM) protocol. Which of the following is a primary advantage of using SCIM over JIT?
Identity Management
Hard
A.SCIM supports real-time, push-based updates from the IdP to the SP, while JIT is a pull-based model that can have significant delays.
B.SCIM provides a standardized protocol for de-provisioning users and synchronizing attribute changes, whereas JIT only handles initial user creation.
C.JIT provisioning only works with SAML, while SCIM is compatible with both SAML and OpenID Connect.
D.JIT provisioning requires a complex on-premises agent, while SCIM is a fully agentless cloud-to-cloud protocol.
Correct Answer: SCIM provides a standardized protocol for de-provisioning users and synchronizing attribute changes, whereas JIT only handles initial user creation.
Explanation:
JIT provisioning typically creates a user account in a service provider (SP) the first time a user tries to log in via SSO. Its primary function is user creation. However, it does not have a standard mechanism for handling de-provisioning (when a user leaves the company) or updating user attributes (like name or department changes). SCIM is a purpose-built REST/JSON-based protocol designed to manage the full identity lifecycle, including create, read, update, and delete (CRUD) operations. This makes SCIM far more robust for maintaining an accurate and secure user base in SaaS applications, especially for timely de-provisioning, which is a critical security control.
Incorrect! Try again.
54An organization is deploying a deception network. The security team places a low-interaction honeypot with emulated SSH and RDP services in the DMZ and a high-interaction honeypot (a fully functional, sandboxed server) in a VLAN adjacent to the production database servers. What is the differential strategic value of these two placements?
Secure Enterprise Network Architecture
Hard
A.The DMZ honeypot acts as an early warning system for external, opportunistic scans, while the internal honeypot is designed to detect and analyze advanced attackers who have already breached the perimeter.
B.The high-interaction honeypot in the DMZ would be too easily compromised, so a low-interaction one is used. The internal honeypot is safer because of the perimeter firewall.
C.The low-interaction honeypot serves as a decoy to absorb DDoS traffic, while the high-interaction honeypot is for training junior security analysts.
D.The DMZ honeypot is used to gather threat intelligence on zero-day exploits, while the internal honeypot is for logging internal policy violations.
Correct Answer: The DMZ honeypot acts as an early warning system for external, opportunistic scans, while the internal honeypot is designed to detect and analyze advanced attackers who have already breached the perimeter.
Explanation:
The placement of deception technology is strategic. A low-interaction honeypot in the DMZ is exposed to the internet and will attract a high volume of automated, low-sophistication attacks. Its value is in early warning and identifying external threat actors. Conversely, any traffic hitting the internal honeypot is highly suspicious, as legitimate users should have no reason to access it. This makes it an extremely high-fidelity sensor for detecting lateral movement by an attacker who has already bypassed perimeter defenses. The high-interaction nature allows the security team to observe the attacker's tools, techniques, and procedures (TTPs) in a safe environment.
Incorrect! Try again.
55In an Active Directory environment, a service account is configured for Kerberos Unconstrained Delegation. What is the most severe security risk associated with this configuration?
Authentication
Hard
A.The service account's password must be stored in reversible encryption, making it easier to compromise.
B.The service account cannot be a member of the Protected Users group, reducing its overall security posture.
C.An attacker can perform an offline brute-force attack against the service account's password by requesting a service ticket for it (Kerberoasting).
D.If the service account is compromised, an attacker can impersonate any user who authenticates to that service and access any other resource in the domain as that user.
Correct Answer: If the service account is compromised, an attacker can impersonate any user who authenticates to that service and access any other resource in the domain as that user.
Explanation:
Unconstrained Delegation is an extremely dangerous permission. When a user authenticates to a service with this enabled, their Ticket-Granting Ticket (TGT) is forwarded to the service's host and cached in memory. If an attacker compromises that host (e.g., the web server), they can extract the user's TGT from memory. With the TGT, the attacker can then request service tickets for any other service in the domain as that user. If a domain administrator authenticates to this service, the attacker can effectively become a domain admin. This is why Unconstrained Delegation is strongly discouraged in favor of Constrained Delegation or Resource-Based Constrained Delegation.
Incorrect! Try again.
56A system uses Attribute-Based Access Control (ABAC). The policy states: Permit IF (user.role == 'doctor' AND resource.type == 'patient_record' AND resource.owner_id == user.id) OR (user.role == 'researcher' AND resource.sensitivity == 'anonymized' AND time.hour > 9 AND time.hour < 17). A user with the role 'researcher' attempts to access a 'patient_record' with sensitivity = 'anonymized' at 8 PM (20:00). What is the outcome and why?
Authorization
Hard
A.Error, because the policy has conflicting rules for the 'researcher' role.
B.Deny, because the time condition (time.hour < 17) is not met.
C.Permit, because the user is a 'researcher' and the data is 'anonymized'.
D.Deny, because a 'researcher' can never access a resource of type 'patient_record'.
Correct Answer: Deny, because the time condition (time.hour < 17) is not met.
Explanation:
ABAC policies are evaluated based on the precise logic defined. The user is a 'researcher', so the second part of the OR condition is evaluated. This part requires three AND conditions to be true: user.role == 'researcher' (true), resource.sensitivity == 'anonymized' (true), and time.hour > 9 AND time.hour < 17 (false, because 20 is not less than 17). Since one of the AND conditions is false, the entire second part of the policy evaluates to false. The first part of the OR is also false because the user is not a 'doctor'. Therefore, the overall policy evaluates to 'Deny'.
Incorrect! Try again.
57An enterprise implements an explicit forward proxy for all user web traffic, which performs full SSL/TLS inspection. To do this, the proxy generates and signs certificates for all HTTPS sites on-the-fly using a corporate root CA certificate that is installed on all client machines. What is a significant security risk introduced by this architecture?
Network Security Appliances
Hard
A.It prevents users from accessing websites that use Extended Validation (EV) certificates, as the proxy cannot replicate the EV status.
B.The performance overhead of on-the-fly certificate generation creates a bottleneck and adds significant latency to all web traffic.
C.It breaks client-side certificate pinning, potentially allowing the proxy to hide a man-in-the-middle attack against a site that uses it, if the proxy's own validation is flawed.
D.It is incompatible with the new TLS 1.3 standard, forcing all connections to be downgraded to TLS 1.2.
Correct Answer: It breaks client-side certificate pinning, potentially allowing the proxy to hide a man-in-the-middle attack against a site that uses it, if the proxy's own validation is flawed.
Explanation:
SSL/TLS inspection is fundamentally a man-in-the-middle (MitM) process. The client establishes a TLS session with the proxy, and the proxy establishes a separate TLS session with the destination server. Certificate Pinning (e.g., HPKP, though now deprecated in browsers, is still used in mobile/custom apps) is a mechanism where a client is configured to only trust a specific public key or certificate for a given domain. The proxy's on-the-fly certificate will not match the pinned key, causing the client connection to fail. More critically, if the proxy's logic for validating the real upstream certificate is flawed (e.g., it accepts a weak signature), it might still present a valid-looking certificate to the client (signed by the trusted corporate CA), effectively masking the upstream security issue and exposing the client to a MitM attack that would have otherwise been caught.
Incorrect! Try again.
58When comparing SAML 2.0 and OpenID Connect (OIDC) for building a modern identity federation solution, what is a key architectural advantage of OIDC that makes it better suited for mobile and single-page applications?
Implement Identity and Access Management
Hard
A.OIDC is built on top of OAuth 2.0 and provides identity information via RESTful, JSON-based ID Tokens, which are easier for modern clients to parse and handle than XML-based SAML assertions.
B.OIDC supports a wider range of cryptographic algorithms for signing tokens, making it more secure than SAML.
C.SAML requires a direct, synchronous back-channel communication between the Service Provider and Identity Provider, which is difficult in mobile environments.
D.OIDC mandates the use of multi-factor authentication, whereas SAML treats it as an optional extension.
Correct Answer: OIDC is built on top of OAuth 2.0 and provides identity information via RESTful, JSON-based ID Tokens, which are easier for modern clients to parse and handle than XML-based SAML assertions.
Explanation:
The primary advantage of OIDC in modern application contexts is its simplicity and alignment with developer-friendly standards. OIDC uses JWTs (JSON Web Tokens) for its ID Token, which is lightweight and easily consumable by JavaScript and mobile clients. In contrast, SAML uses verbose XML documents (SAML Assertions) that require more complex parsing libraries and are generally less friendly to browser-based and mobile applications. OIDC's flows are also designed to be more RESTful and API-friendly, directly leveraging the OAuth 2.0 framework it is built upon.
Incorrect! Try again.
59An organization is using an Identity Governance and Administration (IGA) tool to conduct quarterly access certification campaigns. The tool detects that a specific manager has an approval rate of 100% over the last four campaigns, with an average approval time of under 5 seconds per request. This suggests 'rubber-stamping' rather than genuine review. Which IGA feature is best suited to mitigate the risk from this behavior?
Identity Management
Hard
A.Enforcing Separation of Duties (SoD) policies to prevent the manager from approving access to systems they also manage.
B.Increasing the frequency of the certification campaigns from quarterly to monthly to reduce the number of items in each review.
C.Implementing outlier detection, which flags anomalous approval patterns and can trigger a secondary review by a security officer or a higher-level manager.
D.Using role-based access control (RBAC) to simplify the number of permissions the manager needs to review.
Correct Answer: Implementing outlier detection, which flags anomalous approval patterns and can trigger a secondary review by a security officer or a higher-level manager.
Explanation:
This scenario describes a behavioral problem (rubber-stamping) that undermines the entire access certification process. Outlier detection is an advanced IGA feature that uses analytics to identify abnormal behavior, such as unusually high or fast approval rates. By flagging this manager's activity and escalating it for a secondary, more rigorous review, the IGA system can provide a compensating control against managerial negligence. While SoD and RBAC are important IAM principles, they don't directly solve the problem of a manager failing to perform their review duties properly. Increasing frequency might just lead to faster rubber-stamping.
Incorrect! Try again.
60A packet capture of a TLS 1.3 handshake is analyzed. An observer can see the ClientHello and ServerHello messages, but the server's certificate is not visible in a plaintext Certificate message as it was in TLS 1.2. Why is this the case, and what is the security benefit?
Secure Communications
Hard
A.The certificate is compressed using a proprietary algorithm that Wireshark cannot dissect by default.
B.In TLS 1.3, most of the handshake after the ServerHello, including the server's certificate and extensions, is encrypted. This enhances privacy by preventing passive eavesdroppers from identifying the server or its configuration.
C.The certificate is sent over a separate, out-of-band channel for security, not within the main TLS handshake.
D.TLS 1.3 uses a cached session from a previous connection, and therefore does not need to send the certificate again.
Correct Answer: In TLS 1.3, most of the handshake after the ServerHello, including the server's certificate and extensions, is encrypted. This enhances privacy by preventing passive eavesdroppers from identifying the server or its configuration.
Explanation:
One of the major improvements in TLS 1.3 is increased privacy and a faster handshake. After the client and server exchange hellos and agree on a key (using the key shares sent in the initial messages), the rest of the handshake is encrypted. This includes the EncryptedExtensions, Certificate, CertificateVerify, and Finished messages. By encrypting the certificate, TLS 1.3 prevents passive network observers from easily determining which website the user is connecting to (assuming SNI is also encrypted, which is now possible with ESNI/ECH), thereby significantly improving user privacy.