What type of attack is this?
Emily is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?
Which of the following best describes a virtual directory?
Brian has been asked to work on the virtual directory of his company’s new identity management system. Which of the following best describes a virtual directory?
What was the direct predecessor to Standard Generalized Markup Language (SGML)?
What was the direct predecessor to Standard Generalized Markup Language (SGML)?
Which of the following does not describe privacy-aware role-based access control?
Which of the following does not describe privacy-aware role-based access control?
Which of the following is not a side-channel attack?
A number of attacks can be performed against smart cards. Side-channel is a class of attacks that doesn’t try to compromise a flaw or weakness. Which of the following is not a side-channel attack?
Which of the following reduces help-desk call volume, but is also criticized for the ease with which a hacker
There are several types of password management approaches used by identity management systems. Which of the following reduces help-desk call volume, but is also criticized for the ease with which a hacker could gain access to multiple resources if a password is compromised?
What is the best description for what WAM is commonly used for?
Hannah has been assigned the task of installing Web access management (WAM) software. What is the best description for what WAM is commonly used for?
Which of the following does not correctly describe a directory service?
Which of the following does not correctly describe a directory service?
Role-based access control…
Role-based access control .
Identity management is…
Identity management is
