Authentication & Authorization | Test-1

0%
0

Authentication & Authorization | Test-1

This section focuses on evaluating the security of user authentication and authorization mechanisms. Tests include assessing the strength of password policies, multi-factor authentication (MFA), session management, and protection against brute-force attacks. It also involves verifying proper access controls to ensure that users have appropriate permissions and cannot escalate privileges. Additionally, this section tests the robustness of token management (e.g., JWT, OAuth), secure login processes, and defenses against common threats such as authentication bypass, session hijacking, and privilege escalation.

1 / 22

1. In the context of authentication and authorization, ______ can be users, programs, processes, services, computers, or anything else that can access a resource. When authorized, they can also modify objects. ย It is also an active entity that accesses a passive object to receive information from, or data about, an object.

2 / 22

2. An_____ refers to any passive entity that provides information to active subjects. Examples of such entities include files, databases, computers, programs, processes, services, printers, and storage media

3 / 22

3. _________ is a crucial part of information security that establishes who has privilege to certain information, applications, and resourcesโ€”and under what conditions.

4 / 22

4. The process of confirming that a subject (user/system), in fact, who or what it claims to be is known as:

5 / 22

5. Generally, the enterprise users and their credentials and privileges are stored/managed in:

6 / 22

6. What are the three different types of Authentication attributes?

7 / 22

7. Providing access to a system based on a factor such as passwords is an example of?

8 / 22

8. The best mechanism to securely store passwords in an application database is by:

9 / 22

9. _________ is the process of granting a subject (user/services) permission to access specific resources or capabilities once their identity is verified.

10 / 22

10. Lightweight Directory Access Protocol (LDAP) is used to:

11 / 22

11. __________is something you have, may be any credential based on items that the user can own and carry with them, including hardware devices, like a security token or a mobile phone used to accept a text message or to run an authentication app that can generate a one-time password (OTP) or PIN.

12 / 22

12. What does OAuth stand for?

13 / 22

13. The standard port number used by LDAP protocol is:

14 / 22

14. What does PAM stand for in context of access management?

15 / 22

15. What part does biometrics play in access control?

16 / 22

16. A table that includes both subjects and objects is known as _________. People who might need to access items are typically referred to as subjects. Typically, objects are documents, information, or other resources that subjects may need to access. They might also be a piece of hardware or a system process. The information in it specifies access levels and permissions for subjects and objects. They are created by organizations to guarantee authorized access and guard against malicious or accidental unauthorized access to sensitive data.

17 / 22

17. How are credentials sent in HTTP Basic Authentication?

18 / 22

18. The standard port number used by LDAPS protocol is:

19 / 22

19. Which of the following is an advantage with passwords-based authentication?

20 / 22

20. What’s the main purpose of OIDC?

21 / 22

21. What does OIDC stand for?

22 / 22

22. What does WebAuthn stand for?

Your score is

The average score is 0%

0%


Related challenges :