Request edit access
Practice Questions 5
These questions are based on Access Control
Sign in to Google to save your progress. Learn more
Jaya has recently joined the QWERTY bank. She logs into a database by entering her credentials. She is able to log in successfully , however she is not able to access the resource. What is the missing element in this case? *
2 points
If authentication and authorization happen at the same time , what could result which could be exploited by a hacker? *
2 points
Paul is a new security administrator for QWERTY bank. He wishes to implement two factor authentication for email servers of the bank when server is accessed by a user. Which of the following is a correct combination of two factor authentication in this case? *
2 points
Paul wants to implement a directory structure for identity management in his organization. He is confused as to which standard is the directory structure based on ? *
2 points
Paul has successfully implemented the directory structure. He used the light weight directory access protocol. So , once you successfully authenticate to the DC, network resources will be available to you (file server, e-mail server etc) as dictated by the configuration of AD. What helps to maintain this organization? *
2 points
Kathy visits the QWERTY bank's website. She finds that the bank does not require her to authenticate for viewing publicly available information. When she tries to view her account , she is asked to authenticate. Which two protocols are likely to be implemented by the bank in this scenario? *
2 points
When Kathy logs into her account at the QWERTY bank , she finds that she is able to access only some of the aspects of her account.  However , she is able to access these resources without authenticating herself again and again. What has QWERTY bank implemented? *
2 points
QWERTY bank is trying to implement various single sign on technologies . Which of the following is an example for single sign on technologies? *
2 points
Kathy uses her account on her QWERTY bank's website to pay for an airline ticket. She finds that she is redirected to the airlines website where she pays for the ticket. She is redirected back to her bank's website after successful payment. What has been implemented and who is holding the authentication information in the second case? *
2 points
This markup language allows for the integration and inter operation of service provisioning requests across various platforms. Which is this language? *
2 points
Submit
Clear form
This content is neither created nor endorsed by Google. - Terms of Service - Privacy Policy

Does this form look suspicious? Report