Which of the following correctly describes the difference between phishing and pharming?
Phishing and pharming are similar. Which of the following correctly describes the difference between phishing and pharming?
Which of the following correctly describes a federated identity and its role within identity management proces
Which of the following correctly describes a federated identity and its role within identity management processes?
What type of attack is this?
Emily is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?
Which of the following best describes a virtual directory?
Brian has been asked to work on the virtual directory of his company’s new identity management system. Which of the following best describes a virtual directory?
What was the direct predecessor to Standard Generalized Markup Language (SGML)?
What was the direct predecessor to Standard Generalized Markup Language (SGML)?
Which of the following does not describe privacy-aware role-based access control?
Which of the following does not describe privacy-aware role-based access control?
Which of the following is not a side-channel attack?
A number of attacks can be performed against smart cards. Side-channel is a class of attacks that doesn’t try to compromise a flaw or weakness. Which of the following is not a side-channel attack?
Which of the following reduces help-desk call volume, but is also criticized for the ease with which a hacker
There are several types of password management approaches used by identity management systems. Which of the following reduces help-desk call volume, but is also criticized for the ease with which a hacker could gain access to multiple resources if a password is compromised?
What is the best description for what WAM is commonly used for?
Hannah has been assigned the task of installing Web access management (WAM) software. What is the best description for what WAM is commonly used for?
Which of the following does not correctly describe a directory service?
Which of the following does not correctly describe a directory service?