1. Which of the following allows an application to securely authenticate a user by receiving credentials from a web domain?
A) SAML B) Kerberos C) RADIUS D) TACACS+
2. Which of the following can be provided to an AAA system for the identification phase?
A) Username B) Private certificate C) Permissions D) One-time token
3. Which of the following encryption methods does PKI typically use to securely protect keys?
A) Asymmetric B) Obfuscation C) Elliptic curve D) Digital signatures
4. When trying to log onto a company - s new ticketing system,some employees receive the following message: Access denied: too many concurrent sessions. The ticketing system was recently installed on a small VM with only the recommended hardware specifications. Which of the following is the MOST likely cause for this error message?
A) The firewall is misconfigured. B) The software is out of licenses. C) The VM does not have enough processing power. D) Network resources have been exceeded.
5. Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML iframe with JavaScript code via a web browser?
Leave a comment