Authentication & Authorization | Test-4
This section focuses on evaluating the security of user authentication and authorization mechanisms. Tests include assessing the strength of password policies, multi-factor authentication (MFA), session management, and protection against brute-force attacks. It also involves verifying proper access controls to ensure that users have appropriate permissions and cannot escalate privileges. Additionally, this section tests the robustness of token management (e.g., JWT, OAuth), secure login processes, and defenses against common threats such as authentication bypass, session hijacking, and privilege escalation.
1 / 14
1. A password that requires the user to respond to a series of questions, either factual ones like “what is your mother’s maiden name?” or subjective ones like “what is your favorite kind of music?” are known as:
Cognitive passwords refer to authentication methods that leverage unique patterns of user behavior or cognitive traits, such as keystroke dynamics, mouse movements, answering questions about themselves or other behavioral biometrics, as a means of user identification.
2 / 14
2. Which of the following is the secure method of storing Database access credentials in an application?
Key Management Services (KMS) are specialized services or systems that handle the generation, storage, distribution, and rotation of cryptographic keys used for securing data, communication, or digital transactions. KMS ensures the secure and effective management of encryption keys throughout their lifecycle in a manner that aligns with security policies and best practices.
3 / 14
3. What types of OAuth grant flows are commonly used?
Commonly used OAuth grant flows include:
4 / 14
4. Which of the following supports fine grained access controls
JWT (JSON Web Token) tokens support fine-grained access controls by including custom claims in the token payload. These claims can represent specific user permissions, roles, or attributes, allowing for granular control over what resources or actions a user is authorized to access. The application or service receiving the JWT can then make access control decisions based on the information contained within the token, enabling fine-grained and context-aware authorization.
5 / 14
5. What kind of attack is possible if a 4-digit PIN and a token are used to access a computer system and the token checks the PIN offline for accuracy?
A brute force attack is a method where an attacker systematically attempts all possible combinations of passwords or encryption keys to gain unauthorized access to a system or account. This method relies on sheer computational power and persistence to discover the correct credential through trial and error.
6 / 14
6. How is a challenge/response protocol utilized with a smart token device implementation?
In short, a challenge/response protocol is a security mechanism where one party (the challenger) presents a question or challenge to another party (the responder), who must provide a specific response or answer. This process is used for authentication and verification purposes, ensuring that the responder possesses the required credentials or information to satisfy the challenge and gain access.
7 / 14
7. Which of the following statements best describes a federated identity and its role within an identity management processes?
A Federated identity plays a key role in identity management processes by enabling users to access multiple systems or applications with a single set of credentials. It establishes a trust relationship between different identity providers and service providers, allowing for seamless and secure authentication across a federated network. This promotes Single Sign-On (SSO), simplifies user access, and enhances overall identity management efficiency by centralizing authentication and authorization processes.
8 / 14
8. In this model, every object in a protected system has an owner, and owners grant access to subjects at their discretion. This model provides case-by-case control over resources.
The correct answer is Discretionary access control (DAC).
Discretionary Access Control (DAC) is a model in which every object in a protected system has an owner, and the owner has the discretion to grant or restrict access to subjects (users or processes). This model allows for case-by-case control over resources, enabling owners to decide who can access their objects.
Hereโs a brief overview of the other options:
9 / 14
9. Which of the following statements correctly describes biometric methods?
Biometric authentication methods are often considered more expensive and provide high protection because they leverage unique physiological or behavioral characteristics, such as fingerprints or facial features, which are inherently difficult to replicate or forge. The technology required for biometric systems, such as fingerprint scanners or facial recognition cameras, tends to be sophisticated and costly. The combination of advanced technology and the inherent uniqueness of biometrics contributes to their high level of protection, justifying the associated costs.
10 / 14
10. Which of the following best describes a digital certificate?
Digital certificates act as digital passports, containing your identity and a public key to confirm your authenticity without revealing sensitive information.
11 / 14
11. What are passkeys?
Passkeys are an authentication method for websites and apps that were first made popular by Apple Inc in June 2022 when the company added support in iOS and MacOS. Currently, Passkeys is a standard that’s promoted by Google, Apple, Microsoft, the World Wide Web Consortium, and the FIDO Alliance.
12 / 14
12. How do passkeys work?
It’s like unlocking your phone – password-free and secure!
13 / 14
13. Even though passwordsโor “something you know”โremain the most widely used authentication factor, they are regarded as among the least reliable. This is due to the ease with which users can share passwords and the relative ease with which adversaries can steal or guess them. What is the most effective way to defend against attacks on this type of authentication?
Enforce strong passwords for users which makes hackers hard to guess
14 / 14
14. _______ are a one-time use link sent to the user during the authentication process. After providing the username, the user is sent a URL, either to the user’s email address or their mobile phone via text. The user clicks to authenticate themselves without entering a password.
Magic links are one-time, secure URLs sent to users’ email addresses to facilitate passwordless authentication. Clicking on the magic link verifies the user’s identity and grants access without requiring a traditional password.
Your score is
The average score is 0%
Restart Test
Related challenges :