Skip to Content

Common Technical Interview Questions and Answers Update on May 06, 2022

Network security authentication methods

Question 11

Question

Identity management and authentication are sometimes used interchangeably; however, they are distinct in this fundamental way:

A. Identity management is the enterprise version of authentication.
B. Authentication is a subset of identity management.
C. Identity management is a subset of authentication.
D. Digital identity is determined by authentication, not identity management.

Answer

B. Authentication is a subset of identity management.

Explanation

Identity management is the process of assigning access based on digital identity. Authentication is one of the methods used to accomplish this process, in addition to password management, identity analytics, and network and application access control. Identity management and authentication are both intrinsic to IAM programs.

Question 12

Question

Which network security authentication method may be either software- or hardware-based to be used in a single login session or transaction?

A. Single sign-on
B. Two-factor authentication
C. One-time password
D. Smart card

Answer

C. One-time password

Explanation

A one-time password is made up of automatically generated numeric or alphanumeric characters used to authenticate a user for a single transaction or login session.

Question 13

Question

Australian courts ruled in favor of a man who was fired after refusing to submit his fingerprints to his employer for biometric authentication because he was:

A. not accorded due consent processes.
B. not provided an alternative to biometrics.
C. not compliant with regulatory requirements.
D. both not accorded due consent processes and not provided an alternative to biometrics.

Answer

D. both not accorded due consent processes and not provided an alternative to biometrics.

Explanation

The man won his unfair dismissal case because the Fair Work Commission determined he was not accorded due consent processes and not provided a reasonable alternative to biometric authentication.

Question 14

Question

Though convenient for the user, single sign-on (SSO) authentication creates a single point of failure, which, if compromised, could threaten the entire organization’s security, as well as third-party application accounts.

A. True
B. False

Answer

A. True

Explanation

SSO provides users a convenient way to authenticate their identity without a username and password. However, it is also attractive to malicious actors. The problem with SSO is that it creates a single point of failure; thus, if compromised, it acts as a master key to access third-party data and applications.

Question 15

Question

Built-in cloud IAM program are _________ to implement for IT teams that manage on-premises applications, multiple cloud services, hybrid environments, distributed data stores and customized legacy systems than for organizations that run all operations on a single cloud platform.

A. more difficult
B. more simple
C. more rewarding
D. both more simple and more rewarding

Answer

A. more difficult

Explanation

Organizations with varied environments will not benefit as much from built-in IAM services from a cloud provider than organizations that run on a single cloud platform. They must either deploy multiple IAM products or find one IAM system that supports multiple environments.

Question 16

Question

The most prevailing standards used to send authorization messages between trusted partners include:

A. Open Authorization and OpenID Connect.
B. Security Assertion Markup Language and GDPR.
C. Open Authorization and Security Assertion Markup Language.
D. OpenID Connect and FIDO.

Answer

C. Open Authorization and Security Assertion Markup Language.

Explanation

Historically, Open Authorization (OAuth) and Security Assertion Markup Language (SAML) are the most commonly used standards to send authorization messages between trusted partners. However, as biometric data becomes invaluable, beware how these “trusted” partners vie for customer data and how they may introduce privacy concerns.

Question 17

Question

Which of the following categories is not used to describe authentication methods?

A. Something you like
B. Something you know
C. Something you possess
D. Something you are

Answer

A. Something you like

Explanation

According to Brett McDowell, former executive director at FIDO Alliance, authentication methods include the following three categories:

  • something you know, such as a PIN or password;
  • something you possess, such as a token or smart card; and
  • something you are, including biometrics, such as voice or facial recognition.

Question 18

Question

The easiest method of implementing passwordless authentication in network security that still provides excellent security and user convenience is:

A. secure link via email.
B. logged-in users (Apple only).
C. one-time code via text or call.
D. facial recognition.

Answer

C. one-time code via text or call.

Explanation

The easiest passwordless authentication method to implement that is virtually hack-proof and still convenient for the user is the one-time code via text or call strategy. There is no need to enter a password, thus no password is stored on any device or server, and it only has a single-use lifetime of a few minutes.

Question 19

Question

From an architectural standpoint, the key differentiator between IAM and customer IAM (CIAM) is:

A. compliance.
B. scalability.
C. privacy.
D. price.

Answer

B. scalability.

Explanation

The most significant difference between IAM and CIAM is scalability. CIAM must be able to scale to accommodate customer traffic and spikes without sacrificing response time. If not incorporated into the CIAM architecture from the outset, this level of scalability is challenging to tack on after the fact.

Question 20

Question

Periodic IAM reviews and audits can determine an organization’s compliance with all of the following critical requirements, except:

A. U.S. Family Educational Rights and Privacy Act.
B. North American Electric Reliability Corporation.
C. GDPR.
D. Web Content Accessibility Guidelines.

Answer

D. Web Content Accessibility Guidelines.

Explanation

Audits and reviews can confirm IAM compliance with U.S. Family Educational Rights and Privacy Act and North American Electric Reliability Corporation, in addition to HIPAA, GDPR, Sarbanes-Oxley Act, ISACA, COBIT, NIST, PCI DSS and other critical requirements.

    Ads Blocker Image Powered by Code Help Pro

    Ads Blocker Detected!!!

    This site depends on revenue from ad impressions to survive. If you find this site valuable, please consider disabling your ad blocker.