CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 5 ■ dentity and Access Management (Domain 5)I 105



  1. During a log review, Saria discovers a series of logs that show login failures, as shown here:
    Jan 31 11:39:12 ip-10-0-0-2 sshd[29092]: Invalid user admin from remotehost
    passwd=orange
    Jan 31 11:39:20 ip-10-0-0-2 sshd[29098]: Invalid user admin from remotehost
    passwd=Orang3
    Jan 31 11:39:23 ip-10-0-0-2 sshd[29100]: Invalid user admin from remotehost
    passwd=Orange93
    Jan 31 11:39:31 ip-10-0-0-2 sshd[29106]: Invalid user admin from remotehost
    passwd=Orangutan1
    Jan 31 20:40:53 ip-10-0-0-254 sshd[30520]: Invalid user admin from remotehost
    passwd=Orangemonkey


What type of attack has Saria discovered?
A. A brute-force attack
B. A man-in-the-middle attack
C. A dictionary attack
D. A rainbow table attack


  1. Place the following steps in the order in which they occur during the Kerberos authentica-
    tion process.
    A. Client/server ticket generated
    B. TGT generated
    C. Client/TGS key generated
    D. User accesses service
    E. User provides authentication credentials

  2. What major issue often results from decentralized access control?
    A. Access outages may occur.
    B. Control is not consistent.
    C. Control is too granular.
    D. Training costs are high.

  3. Callback to a landline phone number is an example of what type of factor?


A. Something you know
B. Somewhere you are
C. Something you have
D. Something you are
Free download pdf