Authentication quiz

Take this quiz to see how much you've learned in the Authentication lesson of Identity and Access Management Security School.

1. Which authentication mechanism is the easiest to deploy and the easiest to break?

  1. shared secrets (passwords and PINs)
  2. biometrics
  3. tokens
  4. geo-location

2. Which of the following publishes internal IDs to the outside world or external business partner IDs internally, or both?

  1. application-specific directories
  2. OS-specific directories
  3. departmental directories
  4. border directory

3. True or False: Tokens and smart cards have identical capabilities today.

  1. True
  2. False

4. What should you consider when deploying an LDAP structure?

  1. Using a unique User ID across the entire structure
  2. Using LDAP chaining
  3. Making the people database space as flat as possible
  4. All of the above

5. Which of the following is not a best practice for using tiered groups to control user access?

  1. Apply policies to each layer individually.
  2. Keep the group structure as simple as possible.
  3. Don't nest OUs or groups more than a few layers deep.
  4. Keep the number of groups to a minimum.

If you got two or more wrong, revisit these materials in the Authentication lesson:

  • Webcast: FFIEC: How to comply with the authentication regulation
  • Technical article: Authentication in the real world: Moving from strategy to implementation
  • Podcast: Balancing the authentication equation
  • If you got four or more correct, return to Identity and Access Management Security School and start another lesson.

    This was last published in August 2006

    Dig Deeper on Two-Factor and Multifactor Authentication Strategies

    PRO+

    Content

    Find more PRO+ content and other member only offers, here.

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close