Authentication & Authorization | Test-3
This section focuses on evaluating the security of user authentication and authorization mechanisms. Tests include assessing the strength of password policies, multi-factor authentication (MFA), session management, and protection against brute-force attacks. It also involves verifying proper access controls to ensure that users have appropriate permissions and cannot escalate privileges. Additionally, this section tests the robustness of token management (e.g., JWT, OAuth), secure login processes, and defenses against common threats such as authentication bypass, session hijacking, and privilege escalation.
1 / 13
1. Is HTTP Basic authentication method secure?
Basic authentication is not considered secure on its own due to the following:
2 / 13
2. How does OIDC build upon OAuth?
OIDC (OpenID Connect) builds upon OAuth by adding an identity layer to the authorization process. While OAuth primarily focuses on delegated access and authorization, OIDC introduces a standardized way for applications to obtain information about the end user’s identity. It provides user authentication, allowing for secure and standardized user identification, in addition to the authorization capabilities offered by OAuth.
3 / 13
3. Which of the following is NOT a framework, concept or standard of SSO?
RADIUS is an authentication protocol, but it is not used in SSO scenarios
4 / 13
4. What’s the main function of an IdP?
The main purpose of an IdP (Identity Provider) is to manage and authenticate user identities within a system or across multiple systems. An IdP serves as a trusted source for verifying user credentials and providing authentication tokens or assertions to enable secure and seamless access to various applications or services. In the context of federated identity systems, an IdP plays a key role in allowing users to use a single set of credentials to access multiple connected applications or services, promoting Single Sign-On (SSO) and simplifying user authentication and authorization processes.
5 / 13
5. The use of โresource serversโ and โauthorization serversโ to facilitate a โclientโ web service (such as LinkedIn) to access a โresource ownerโ (such as Udemy) for federated authorization is a feature of which open standard?
OAuth (Open Authorization) is an open standard that allows users to grant third-party applications limited access to their resources without sharing their credentials. It facilitates secure and controlled authorization by enabling users to provide permissions for specific actions or data, often used in scenarios where external services need to access user information from another service (e.g., social media logins).
6 / 13
6. What are the main players involved in an OAuth flow?
The main players involved in an OAuth flow are:
7 / 13
7. Which of the following it NOT used for REST API Authentication
HTTP Session Cookies are used to keep the session alive between browsers (UI) and servers
8 / 13
8. Which of the following is not an advantage of Passwordless Authentication?
The correct answer is Limited adoption and compatibility.
Limited adoption and compatibility is not an advantage of passwordless authentication; it is a potential challenge. While passwordless authentication offers many benefits, such as enhancing security, improving the user experience, and streamlining IT processes, one of the obstacles is that it might not be fully adopted or compatible with all systems and platforms yet.
Hereโs a brief explanation of the advantages:
9 / 13
9. The information security department frequently decides in advance how many user errors are acceptable before classifying them as security breaches. Other name for this number is:
The correct answer is Clipping levels.
Clipping levels refer to predefined thresholds or limits set by the information security department to determine when certain user errors or incidents should be considered security breaches. For example, the number of failed login attempts before triggering an alert or lockout. This concept helps filter out minor or accidental incidents while focusing on potentially significant security concerns.
Hereโs a brief explanation of the other options:
10 / 13
10. Which of the following is a best description of the directory systems that are used in identity management technology?
The hierarchical nature of directory servers refers to their organization of data in a tree-like structure, typically following a hierarchical directory structure. This structure allows for efficient and organized storage and retrieval of information, where data is organized into entries, and relationships are established through parent-child relationships, reflecting a hierarchy.
11 / 13
11. In terms of OpenID Connect (OIDC), which of the following is NOT true?
OIDC (OpenID Connect) is used for identity layer authentication, providing a standardized way for applications to verify the identity of users. It enhances and extends OAuth 2.0 by adding authentication capabilities, allowing users to log in to different services using a single set of credentials, and enabling secure and standardized user identification across web applications.
12 / 13
12. The mutual authentication process entails _______________
The correct answer is A user authenticating to a system and the system authenticating to the user.
Mutual authentication is a process where both parties in a communication (such as a user and a system) authenticate each other. This ensures that not only does the user verify their identity to the system, but the system also verifies its identity to the user, preventing potential man-in-the-middle attacks.
13 / 13
13. During login to their online banking account, the customeris required to enter a nonce from a token device that was issued tothe customer by the bank. This type of authentication is also known as:
Ownership-based authentication refers to a type of authentication method where the user’s identity is verified based on ownership or possession of a specific physical object, such as a smart card, security token, or mobile device. Access is granted when the user presents or uses the owned object as proof of identity, adding a layer of security to the authentication process.
Your score is
The average score is 69%
Restart Test
Related challenges :