CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

106 Chapter 5 ■ dentity and Access Management (Domain 5)I



  1. Kathleen needs to set up an Active Directory trust to allow authentication with an existing
    Kerberos K5 domain. What type of trust does she need to create?
    A. A shortcut trust
    B. A forest trust
    C. An external trust
    D. A realm trust

  2. Which of the following AAA protocols is the most commonly used?
    A. TACACS
    B. TACACS+
    C. XTACACS
    D. Super TACACS

  3. Which of the following is not a single sign-on implementation?
    A. Kerberos
    B. ADFS
    C. CAS
    D. RADIUS

  4. As shown in the following image, a user on a Windows system is not able to use the “Send
    Message” functionality. What access control model best describes this type of limitation?


A. Least privilege
B. Need to know
C. Constrained interface
D. Separation of duties
Free download pdf