• Find Flashcards
  • Why It Works
  • Tutors & resellers
  • Content partnerships
  • Teachers & professors
  • Employee training

Brainscape's Knowledge Genome TM

Entrance exams, professional certifications.

  • Foreign Languages
  • Medical & Nursing

Humanities & Social Studies

Mathematics, health & fitness, business & finance, technology & engineering, food & beverage, random knowledge, see full index, security module 12 flashcards preview, cybersecurity > security module 12 > flashcards.

Which of the following does not take into consideration upper and lowercase letters during the cryptographic function?

LAN Manager hash

Which of the following is a secure methodology when using a password?

Never writing a password down

How do keystroke dynamics determine whether to authenticate an individual or not?

With dwell and flight time

Which of the following is NOT a hash?

How would a user view a list of non-keyboard characters?

Via charmap.exe

What device can be used to create an OTP?

Microsoft implemented the use of multiple password policies within one domain starting with which version of Windows?

Windows Server 2008

An attacker is least likely to use which password discovery method when compromising a strong password?

Brute-force

In respect to security, why is it better to use password management applications to store passwords rather than utilizing a web browser function?

Application store passwords in a user vault file

Which of the following is the fastest, most efficient offline password cracking technique

Rainbow Tables

Why would an administrator resort to key stretching algorithms as opposed to general-purpose algorithms such as MD5?

Key stretching algorithms are slower

Which of the following is a true statement about salts?

Salts can change identical passwords

Which of the following authentication methods are prone to errors?

Standard biometrics

Single sign-on allows users to authenticate across multiple networks and requires what to function?

Which of the following authentication method combinations is an example of multifactor authentication?

TOTP, password, and a username

What does Open Authorization rely on to function and share resources across sites?

Token credentials

Which of the following is considered the strongest password?

L*^dns22Oik

How does Windows manage credentials in an Active Directory environment?

With password setting objects

How is an HMAC-based OTP different from a TOTP?

HMAC requires an event to change values

Authentication factores or credentials assist in verifying which of the following?

Genuine identity

Decks in Cybersecurity Class (73):

  • Threat Model
  • First Look Into Computer Parts And Tools
  • Computer Parts And Tools ( Part 2)
  • Working Inside Desktop Computers And Laptops
  • All About Mother Boards
  • All About Motherboards ( Part 2)
  • More Review
  • More Review Part 2
  • Review : Review
  • Chapter 5 Homework
  • Intro To Networking
  • Intro To Networking 2
  • Intro To Networkig 3
  • Intro To Networking 4
  • Intro To Networking 5
  • Basics Of Device Driver Types
  • Features Of A Linux System
  • The Command Line
  • Managing Rights
  • Advance Networking
  • The Linux Directory
  • Introduction To Security
  • Linux Module 2
  • Linux Module 3
  • Linux Module 4
  • Security Module 3
  • Security Module 4
  • Security Module 5
  • Security Module 6
  • Security Module 9
  • Security Module 10
  • Linux Module 5 : Interactive Quiz
  • Security Module 11
  • Security+ Random Questions 1
  • Security+ Random Questions 2
  • Security+ Random Questions 3
  • Comp Tia Security + Post Assessment
  • Post Assessment 2
  • Post Assessment 3
  • Post Assessment 4
  • Post Assessment 5
  • Post Assessment 6
  • Linux+ Midterm 1
  • Linux+ Midterm 2
  • Linux Midterm 3
  • Security Module 2
  • Security Module 7
  • Security Module 8
  • Security Module 12
  • Ethical Hacking 1
  • Ethical Hacking 1 Quiz
  • Ethical Hacking 2
  • Ethical Hacking 3
  • Ethical Hacking 4
  • Ethical Hacking 5
  • Ethical Hacking 6
  • Ethical Hacking 7
  • Ethical Hacking 8
  • Ethical Hacking 9
  • Ethical Hacking 10
  • Linux Module 9
  • Linux Module 10
  • Chapter 9 Quiz
  • Linux Module 11
  • Ethical Hacking 12a
  • Ethical 12b
  • Identify File Types
  • Corporate Training
  • Teachers & Schools
  • Android App
  • Help Center
  • Law Education
  • All Subjects A-Z
  • All Certified Classes
  • Earn Money!

Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) by Mike Meyers

Get full access to Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) and 60K+ other titles, with a free 10-day trial of O'Reilly.

There are also live events, courses curated by job role, and more.

Understanding Authorization

We discussed authorization in Modules 3 and 11 , but in this module, we’ll go more in depth, detailing the concepts of authorization and how they relate to supporting the authorization processes. We will also look at access control models, which define how organizations frame and implement authorization.

Authorization Concepts

In Module 3 , you learned that authorization is a distinct part of the process of identification, authentication, authorization, and accountability. To recap, identification involves presenting credentials to a system. Authentication is the process of validating those credentials against a centralized database, to ensure that the user is who they say they are. Authorization takes it ...

Get Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.

Don’t leave empty-handed

Get Mark Richards’s Software Architecture Patterns ebook to better understand how to design components—and how they should interact.

It’s yours, free.

Cover of Software Architecture Patterns

Check it out now on O’Reilly

Dive in for free with a 10-day trial of the O’Reilly learning platform—then explore all the other resources our members count on to build skills and solve problems every day.

assignment quiz module 12 authentication

niyander-logo

Niyander Tech

Learn with fun

  • All Coursera Quiz Answers

Module quiz: Active Directory access, protection, and governance management Quiz Answers

Module quiz Active Directory access, protection, and governance management Quiz Answers

In this article i am gone to share Coursera Course: Cybersecurity Identity and Access Solutions using Azure AD by Microsoft Week 3 | Module quiz: Active Directory access, protection, and governance management Quiz Answers with you..

Enrol Link:   Cybersecurity Identity and Access Solutions using Azure AD

Cybersecurity Identity and Access Solutions using Azure AD Week 3 Quiz Answers

Question 1) True or False: Role-based access control (RBAC) is a security framework that assigns permissions to users based on their roles within an organization.

Question 2) An administrator wants to configure a Conditional Access policy that will prompt a user to go through multi-factor authentication (MFA) when certain signals are detected. Which of the following are common signals that Conditional Access policies can consider? Select all that apply.

  • The length of time since the account password was last changed.
  • Named location information.
  • Real-time sign-in risk detection.
  • Random application triggers.

Question 3) You have assigned a User Administrator role, which grants permissions for managing resources that live in Azure AD. Which of the following role categories does this fall under?

  • Privileged roles
  • Service-specific roles
  • Azure AD-specific roles
  • Cross-service roles

Question 4) True or False: Azure AD’s role-based access control (RBAC) allows you to define and manage roles with specific sets of permissions, granting access only to those who truly need it.

Question 5) The administrator at Sam’s Scoops has decided to build an access management approach for the company that is based on the Zero Trust model. Which of these security principles should be followed to align with this model? Select all that apply.

  • Mandate regular password changes.
  • Provide the least privileged access.
  • Verify access attempts explicitly.
  • Don’t allow external users.

Question 6) Complete the following sentence. Many experts believe that ______ is the new security perimeter.

Question 7) Which of the following statements about securing privileged access with Azure AD Privileged Identity Management (PIM) is true?

  • Azure AD PIM requires Azure AD Premium P1 licenses to be enabled.
  • Azure AD PIM does not support managing custom roles, only built-in Azure resource roles.
  • Azure AD PIM does not provide any fine-grained access control options for role assignments.
  • Azure AD PIM allows for permanent admin role assignments, with no expiration date.

Question 8) What can be managed using Azure AD PIM?

  • Only built-in Azure resource roles.
  • Only custom roles in Azure AD.
  • Both built-in Azure resource roles and custom roles.
  • Only Azure AD Premium P2 licenses.

Question 9) Which of the following statements is true regarding just-in-time (JIT) access?

  • JIT access helps maintain security without sacrificing operational productivity.
  • JIT access provides permanent access to privileged accounts.
  • JIT access is not recommended for securing critical data and resources.
  • JIT access requires users to authenticate multiple times for each application.

Question 10) Using Privileged Identity Management (PIM), you would like to assign a role to a user that applies immediately and provides access for an indefinite amount of time. Which of the following assignment types would you use?

  • Permanent eligible
  • Time-bound active
  • Time-bound eligible
  • Permanent active

Question 11) What is one of the benefits of using role-based access control (RBAC)?

  • Centralized administration for individual user permissions.
  • Increased security by limiting access to necessary resources.
  • Increased complexity.

Question 13) You have assigned a Teams Administrator role, which enables the assignee to manage features in the Microsoft Teams application. This app, which resides separately of Azure AD, is used by employees in the organization for communication. Which of the following categories does the Teams Administrator role fall under?

Question 13) What is the main policy engine within the Zero Trust model?

  • Intrusion Detection System (IDS)
  • Zero Trust Application Gateway Conditional Access

Question 14) True or False: Identity governance involves managing and controlling access to resources based on least privilege principles.

Question 15) Which of the following best describes the concept of just-in-time (JIT) access?

  • JIT access grants permanent access to applications and systems, ensuring continuous availability.
  • JIT access limits privileged access based on location, actions, and timing, providing precise control over when and where users can access privileged accounts.
  • JIT access provides immediate access to all applications and systems, without any restrictions.
  • JIT access is a security practice that allows users to access applications and systems without any authentication.

Question 16) Consider an organization that uses cloud-based applications but does not yet have an access management system. It is considering Azure AD because of the capabilities made possible by Privileged Identity Management (PIM). Which Azure AD license should this organization acquire to enable PIM as a tool?

  • Azure AD Free license
  • Azure AD Premium P2 license
  • Azure AD Basic license
  • Azure AD Premium P1 license

Question 17) What does Privileged Identity Management (PIM) help minimize?

  • The number of permissions granted to regular users.
  • The number of applications and systems in Azure AD.
  • The number of authentication methods required for users.
  • The number of people with access to secure information.

Question 18) Consider an organization in which an employee is temporarily designated as a Project Manager for several days, while the true Project Manager is on vacation. As an administrator using Privileged Identity Management (PIM), you would like to assign a role to this user that requires activation and limits their access time to specific start and end dates. Which of the following assignment types would you use?

Question 19) After an audit revealed that certain employee accounts continued to have privileged access that was no longer needed, the administrator at Sam’s Scoops decided to implement role-based access control (RBAC). Which steps should be taken as part of this process? Select all that apply.

  • Identify the roles that exist within an organization.
  • Assign permissions to roles.
  • Set the authentication method that applies to a role.
  • Define what actions users are allowed to take.

Question 20) What is the purpose of using Conditional Access templates in Azure AD?

  • To implement access controls only for remote work scenarios.
  • To deploy preconfigured policies aligned with Microsoft’s recommendations.
  • To create complex access control policies from scratch.

Question 21) The administrator at an organization worries about potential security issues due to poorly managed access and wants to use Privileged Identity Management (PIM) to take a more secure approach. Which statement best describes how PIM can help to accomplish this?

  • PIM is a feature that grants permanent privileged access to all users in Azure AD, increasing flexibility.
  • PIM helps minimize the number of people with access to secure information, reducing the risk of unauthorized access and inadvertent impact on sensitive resources.
  • PIM only supports time-bound access to Azure resources, excluding other Microsoft Online services.
  • PIM allows users to have unlimited access to resources in Azure AD, Azure, and other Microsoft Online services.

Question 22) True or False: Conditional Access policies in Azure AD are based on if-then statements, where a user must complete a specific action to access a resource.

Question 23) You have assigned a Security Administrator role, which allows for management of security features within Azure AD, as well as separate security services like Microsoft Defender for Cloud Apps. Which of the following role categories does this fall under?

Question 24) What are the two types of role definitions in Azure AD?

  • Fixed roles and flexible roles.
  • Built-in roles and custom roles.
  • Basic roles and advanced roles.

Question 25) What is the primary benefit of just-in-time (JIT) access?

  • JIT access eliminates the need for authentication when accessing applications and systems.
  • JIT access grants permanent access to privileged accounts for all users.
  • JIT access increases the availability of applications and systems for all users.
  • JIT access reduces the risk of unauthorized access to critical data and resources.

Question 27) Imagine that an organization wants to change its security approach to provide the least access that users need to perform privileged operations. Which features does Privileged Identity Management (PIM) have that would assist in implementing this approach?

  • Time-bound access to resources, self-service role assignment, and access reviews
  • Time-bound access to resources, approval-based role activation, and multi-factor authentication enforcement.
  • Permanent access to all resources, self-service role assignment, and access reviews
  • Permanent access to all resources, multi-factor authentication enforcement, and access reviews.

Question 28) An employee at Sam’s Scoops needs a very specific set of permissions that isn’t covered by any of the built-in roles in Azure AD, so an administrator must create a custom role. Before the employee gains the permissions, which steps must the administrator follow? Select all that apply.

  • Defining the role by selecting desired permissions from a preset list.
  • Creating a new Azure AD tenant.
  • Verifying the user’s identity through multi-factor authentication.
  • Assigning the role to users or groups.

Question 29) Which of the follow can you manage in Privileged Identity Management (PIM)? Select all that apply.

  • Conditional Access
  • PIM for Groups
  • Azure AD roles
  • Self-service password reset (SSPR)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

  • GDPR Privacy Policy
  • Privacy Policy
  • Terms and Conditions

Greetings, Hey i am Niyander, and I hail from India, we strive to impart knowledge and offer assistance to those in need.

COMMENTS

  1. Quiz: Module 12 Authentication Flashcards

    Authentication. d. Authorization. Attestation is a key pair that is "burned" into the security key during manufacturing and is specific to a device model. It can be used to cryptographically prove that a user has a specific model of device when it is registered.

  2. Practice Test: Module 12 Authentication Flashcards

    Sending the hash to get authenticated. Study with Quizlet and memorize flashcards containing terms like Your enterprise's network requires more administration every day. You are tasked with setting up a centralized server so that authentication and authorization can be centrally managed while enhancing security.

  3. Module 12

    Once credentials are entered, the AP sends an authentication request to the RADIUS server. If verified, the server sends the authentication acknowledgment to the AP. The user is then authorized to join the network. These are the steps involved in a successful authentication by a RADIUS server. Study Module 12 - Authentication Q flashcards from ...

  4. Security Module 12 Flashcards by lshan x

    20. Q. Authentication factores or credentials assist in verifying which of the following? Study These Flashcards. A. Genuine identity. Study lshan x flashcards from lshan x's class online, or in Brainscape's iPhone or Android app. Learn faster with spaced repetition.

  5. CH 12 Comptia Security+ Guide to Network Security ...

    Module 12 AuThenTicATion 365. Another human characteristic that can be used for authentication is a person's vein (one of the "tubes" that form part of the blood circulation system in the human body that carries oxygen-depleted blood back toward the heart). Typically vein images in a user's palm or finger for authentication can be ...

  6. Chapter 12.docx

    Chapter 12 Module 12 Authentication and Authorization Implementation Techniques Lab 4. Which of the following is considered as the ... Quiz 12 1. How is the Security Assertion Markup Language (SAML) used? ... framing, and slant. Make sure to include in your assignment: Name of the article and its au. Q&A.

  7. Module 12

    12.7.2 Module 12 - Application Layer Services Quiz Answers. Networking Essentials v2.0. 12.7.2 Module 12 - Application Layer Services Quiz Answers. Networking Essentials v2.0. IT Questions Bank; ... Although both Telnet and SSH request authentication before a connection is established, Telnet does not support encryption of login credentials. ...

  8. [Module 12- Authentication and Authorization Implementation ...

    In this module, you will complete the following exercises:Exercise 1 - Using Directory Services to Administer User and Group AccountsExercise 2 - Authenticat...

  9. Chapter 13 practice questions

    Quiz Module 12 Authentication. Cyber Security Fudamentals None. 1. Exercise 3 - Reconnaissance. Cyber Security Fudamentals None. 2. Chapter 15 practice tes. Cyber Security Fudamentals None. 1. Finals Review Questions. Cyber Security Fudamentals None. 4. Chapter 11 practice questions.

  10. Module 12 quiz set 1

    Aplia Assignment; BANA 2082- Exam 4 study guide 2; Bio 2 Final Exam Organizers; EES 150 - Review for Exam 2; Proposal Speech - Grade: B; ... Module 12 quiz set 1. More info. Download. Save. Quiz 12 . Due Nov 20 at 1 1:59pm Points 5 Questions 20. A vailable until Nov 20 at 1 1:59pm T i me Limit None. Allowed Attempts 2.

  11. Module 12 Authentication Flashcards

    Typically, a small device with a window display. Module 12 Authentication. Pass the Hash Attack. Click the card to flip 👆. An exploit in which an attacker steals a hashed user credential and, without cracking it, reuses it to trick an authentication system into creating a new authenticated session on the same network.

  12. Quiz #12

    Quiz #12 - Chapter 12 Authentication and Account Management CET4663-16Spring 0W59. Doc Preview. Pages 7. ... Module 15 Using a Nonpersistent web Browser. Q&A. ... 1.1 Discussion Assignment Communicating the Problem.docx. SUNY Westchester Community College. BUS 208.

  13. Module quiz: Active directory authentication Quiz Answers

    Password Writeback. Question 17) True or False: Azure AD Hash Synchronization is a means of encrypting information stored in an Active Directory. True. False. Question 18) True or False: MFA is the use of biometrics when validating a user. True.

  14. Lab-4-Applying User Authentication and Access Controls

    Lab-4-Applying User Authentication and Access Controls applying user authentication and access controls (4e) fundamentals of information systems security, ... Assignments. 100% (8) 10. Lab-6-Assessing Common Attack Vectors. Information System Security. Assignments. ... Module 12 quiz set 1; Module 10 quiz set 2; Module 15 quiz set 1;

  15. Module 12 Understanding Authorization

    MODULE 12 Understanding Authorization. We discussed authorization in Modules 3 and 11, but in this module, we'll go more in depth, detailing the concepts of authorization and how they relate to supporting the authorization processes.We will also look at access control models, which define how organizations frame and implement authorization.

  16. Module 12: Network Security Infrastructure Quiz Answers

    Both IDS and IPS can use signature-based technology to detect malicious packets. An IPS cannot replace other security devices, such as firewalls, because they perform different tasks. 3. Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)

  17. Test yourself with this e-learning authentication quizlet

    E-learning is reaching new levels of importance when it comes to achieving these goals. Fortunately, the options IT pros have to access learning materials are also expanding. The quizlet below comes from PebbleU, Technics Publications' subscription-based training platform, which provides IT professionals access to its e-books, monographs, video training and social media connections.

  18. Chapter 8 practice questions

    Quiz Module 12 Authentication. Cyber Security Fudamentals None. More from: JS. JS. Jude Surin 999+ impact 999+ Miami Dade College. Discover more. 6. Chapter 2 Reveiw questions. Cyber Security Fudamentals 100% (1) 2. Chapter 13 practice questions. Cyber Security Fudamentals None. 2. Chapter 15 practice tes.

  19. Module quiz: Active Directory access, protection, and governance

    Question 1) True or False: Role-based access control (RBAC) is a security framework that assigns permissions to users based on their roles within an organization. True. False. Question 2) An administrator wants to configure a Conditional Access policy that will prompt a user to go through multi-factor authentication (MFA) when certain signals ...

  20. Chapter 3 practice questions

    Quiz Module 12 Authentication. Cyber Security Fudamentals None. 2. Chapter 15 practice tes. Cyber Security Fudamentals None. 2. Chapter 13 practice questions. Cyber Security Fudamentals None. More from: Cyber Security Fudamentals CTS 1134. Miami Dade College. 20 Documents. Go to course. 6.

  21. 6.1.2 Authentication, Authorization, and Accounting

    6.1 Authentication, Authorization, and Accounting Authentication, Authorization, and Accounting. To be an effective security professional, you need to understand one of the fundamental frameworks used to control access to various organizational resources. This framework is known as authentication, authorization, and accounting, or AAA ...