Chapter 8: Identity and Access Management Questions with 100% Correct Answers | Verified
This is the ongoing management of the rights of users is called - privilege management IAM - Identity and Access Management LDAP - Lightweight Directory Access Protocol This is the most common choice of LDAP implementations - OpenLDAP This is a Cisco-designed authentication protocol, that uses TCP to provide authentication, authorization, and accounting services -TACACS+ TACACS+ has encryption flaws so it should only be run on ________________________________ administrative networks - isolated This is one of the most common AAA systems for network devices, wireless networks, and other services; it can operate via TCP or UDP and operates in a client-server model. - RADIUS RADIUS passwords are obfuscated by a shared secret and MD5 hash, so they are not very strongly protected, so RADIUS traffic between the RADIUS network access server and the RADIUS server is typically encrypted using __________________ tunnels. - IPSec This protocol is designed to be used on untrusted networks and uses encryption to protect its authentication traffic. It uses Ticket Granting Tickets in its process. - Kerberos Active Directory (AD) uses _______________________________ for authentication. - Kerberos SSO - Single Sign OnThese systems are similar to SSO, and allow an identity to be reused on multiple sites while relying on authentication via a single identity provider. - Shared Authentication
Written for
- Institution
- Chapter 8: Identity and Access Management
- Course
- Chapter 8: Identity and Access Management
Document information
- Uploaded on
- November 22, 2023
- Number of pages
- 8
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
chapter 8 identity and access management
Also available in package deal