CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 5 ■ dentity and Access Management (Domain 5)I 115



  1. Jim configures his LDAP client to connect to an LDAP directory server. According to the
    configuration guide, his client should connect to the server on port 636. What does this
    indicate to Jim about the configuration of the LDAP server?
    A. It requires connections over SSL/TLS.
    B. It supports only unencrypted connections.
    C. It provides global catalog services.
    D. It does not provide global catalog services.

  2. The X.500 standards cover what type of important identity systems?


A. Kerberos
B. Provisioning services
C. Biometric authentication systems
D. Directory services


  1. Microsoft’s Active Directory Domain Services is based on which of the following
    technologies?
    A. RADIUS
    B. LDAP
    C. SSO
    D. PKI

  2. Lauren is responsible for building a banking website. She needs proof of the identity of the
    users who register for the site. How should she validate user identities?
    A. Require users to create unique questions that only they will know.
    B. Require new users to bring their driver’s license or passport in person to the bank.
    C. Use information that both the bank and the user have such as questions pulled from
    their credit report.
    D. Call the user on their registered phone number to verify that they are who they claim
    to be.

  3. By default, in what format does OpenLDAP store the value of the userPassword attribute?


A. In the clear
B. Salted and hashed
C. MD5 hashed
D. Encrypted using AES256 encryption


  1. A new customer at a bank that uses fingerprint scanners to authenticate its users is sur-
    prised when he scans his fingerprint and is logged in to another customer’s account. What
    type of biometric factor error occurred?
    A. A registration error
    B. A Type 1 error
    C. A Type 2 error
    D. A time of use, method of use error

Free download pdf