Quizzes Combined
Quizzes Combined
Which security standards ensures that unnecessary permissions are not assigned to the user – POLP
2. You’re assigning permissions for users to access a database. What does this result in for users? –
authorization
3. What benefits do AD OU’s provide over containers? – ability to assign GPO’s
4. What must be considered when combining share and NTFS permissions? – the most restective
permissions apply
5. Which linux file contains linux user password hashes - /etc/shadow
6. Which linux command is used to assign file system permissions- CHMOD
7. Which access options are available while creating an AWS IAM user – console access, programmatic
access
8. In AWS what is the IAM policy – a collection of related permissions
9. What results an identity provider STS digitally signing a claim – security token
10. Facial recognition is what category of authentication – something you are
11. How often does the Microsoft authenticator app change six digits code – every 30 seconds
12. Which these security measures are used to specifically control physical access – signage, fire
suppression, safes, bollards
13. What is another term for type 1 hypervisor – native
14. what access model uses integrity verification procedures that run periodically to check the
consistency of the integrity rules in the systems – clark- Wilson
15. which model handles the access decisions of subjects based on organizational charts,
responsibilities, or geographic location – role based
16. which form of access model is often used with infrastructure ACL’s on routers and firewall devices –
rule based
17. which of these MAC models is a confidentiality model – Bell-LAPedulla
18. in which access model is the owner of an object most likely to have control over permissions and
sharing – discretionary
19. what access model would you choose if you want it to make decisions based on weighing rules
against their characteristics of the subject actions and the request environment – the access is
attribute based
20. what access control model seeks to imitate real world decision making while also considering
operational needs and vulnerability with every access control decision – risk based
21. how are HMAC based one time passwords encrypted – using a symmetric key
22. which Microsoft azure configuration checks where users are authenticated from – conditional access
policy
23. which methods are not available when configuring google two steps verification- conditional access
policies
24. which port does RADIUS authentication used by default – 1812
25. which attributes are used to determine file system permissions when using windows dynamic access
control – active directory users, devices and file systems objects
26. which command can be used to manually refresh group policy on a windows host – GPU update
27. you need to view passwords cracked by the ‘’john the ripper’’ tool. which command should you
issue – john - - show
28. Which tool can be used to discover RDP hosts on a network – nmap
29. you need to ensure Microsoft azure cloud technicians can administer virtual machine in a specific
resource group. What should you do? – assign the virtual machine contributor role to the resource
group
30. what is the term used to describe administration of subjects and their access privileges – identity
management
31. The definition of identity management is – managing end users and their work tasks
32. The purpose of IAAA is to – make sure that every entity inside of your ornamentation is uniquely
identified
33. Examples of contextual personal identifying information would be – settings, interests, preferences
34. What are the three authentication factors – something you are, something you have and something
you have.
35. True or false? Text message sent to your mobile phone containing a number used to reenforce
authentication on a webpage is considered something you know authentication factor – false
36. What would be an example of “ something you have” type of authentication factor – USB token
37. What would be an example of “something you are “ type of authentication factor – retina scan,
fingerprint
38. Based on the zephyrs analysis chart what biometric technique has the highest level of distinctiveness
– iris scan
39. What biometric error rate involves you providing your valid biometrics and the system denies you
access when it should’ve allowed you access – FRR
40. How many authentication factors are you using when supplying a username and PIN to authenticate
to a system – single factor
41. What is the term for the subdivisions of the directory tree that is provided by directory service –
organizational units
42. Which of the following statements about kerberos are true? – Kerberos takes advantage of session
keys, Kerberos uses three components to operate (AS,KDC,TGS) , Kerberos is a form of single sign on
43. What two elements make up the challenge response sent from the client to the server with NT LAN
manager – challenge number + password hash
44. In a password policy you can dictate various standards such as – character is used, password length
45. Reasons a dictionary attack might fail include - you reached maximum attempts, no matches were
found
46. which is typically the quickest attack method – dictionary
47. what is rainbow table –List pf precomputed hashes associated with passwords
48.
49. A tool used to verify password integrity is – Cain and abel
50. What type of password would you perform for cain and abel to calculate all possible passwords
based on character set and length you supply- Brute force attack
51. Benefit of password manager include-
52. Can create password you couldn’t remember
53. Remembers password for you
54. Same sign on is defined as – Same login credentials for various distinct accounts on machine
55. What object is used to allow access to multiple resourses on the network in single sign on scenario-
token
56. Service accounts can be used for things like- SQL server
57. What is the advantage of federated identity- federated identity are very scalable
58. What common authentication strategies are used to implement federated logons within the website
59. Google authentication
60. Facebook authentication
61. Select the option constraint for an restfull api – code on demand
62. Select the benefit to caching and proxing – horizontal scaling
63. Select the option to using ORM to extend an restfull application- translates database object into
records
64. What HTTP code should be returned if a requested resourse is not found- 400
65. What HTTP code should be returned if a requested resourse for a successful post request- 201
66. Select the appropriate HTTP response codes for a successful PUT test- 204,201,200
67. If a patch request fails because of resourse is missing what HTTP status code should be returned –
404
68. What HTTP code should be returned if an internal server error on a delete request- 500
69. Select the function prefix that pytest looks for inside of python test files- test
70. Which of the following are valid authentication factors
71. Something you know
72. Something you have
73. Something you are
74. All identity and authentication must be tied to an IP address -false
75. NTLM credentials are based on data obtained from interactive logon process
76. Which option is not part of NTLM ? – domain control doing authentication
77. Which technique is used by CHAP to validate the identity of a person while maintaing the privacy of
the shared secret password between the participation parties- challenge/ response
78. Which client server protocol enables a remote access server to communicate with a central server to
authenticate dial in users and authorize their access to systems- radius
79. Which statement is false regarding TACACS- it combines authentication and authorization message
80. Which Kerberos trusted third party service familiar with all systems and trusteed by all data integrity
– KDC
81. Which protocol provide secure interactive read/write management access to an X500 – LDAPS
82. Secure token stores which of the following components- biometric data, digital
signature,cryptographic keys, pins, passwords
83. Which cloud is used by many sso connection for thousands of large enterprises , govt agencies,
service providers, that communicate on the internet- SAML
84. Which protocol that verifies the end user is a basic identity layer on Outh2.0 protocol- Open ID
connect
85. Which statement is not true about the outh2.0- it is the proprietary framework that allows any
application complete access to an HTTPS service
86. Which option is a free and open source system that provides federated identity services for both
inter and intra-organizational applications and service? – Shibboleth
87. Which identity management capabilities can be provided by azure active directory-
88. Device registration
89. Role based access control
90. Multi factor authentication
91. If user named JohnDoe creates a new azure subscription using the address [email protected],
then creates a new user janedoe what I fully qualified user name of the new user-
[email protected]
92. Which administrative roles are available by default in azure active directory- Limited administrator,
global administrator, user
93. Integration with application azure active directory provides which primary capabilities- secure signin
and authorization
94. Which component of federation metadata is responsible for providing a single ign-in and single sign-
out URL- WS federation endpoint URL
95. For which purpose might you implement the SAML2.0 protocol-
96. WS security
97. Identity federation
98. Web single sign on
99. Open ID is built on top of which authentication protocol- Oauth 2.0
100. The flow of requests and responses between a users browser, the application and azure active
directory is determined by which component? -the authentication protocol used
101. Which component of graph API is capable of checking for changes ina directory without having to
frequently request updates? The differential query
102. The URLs used to access resourses or entities in graph API are compromised of four main parts.
Which of these are valid
103. Query string option
104. Tenant identifier
105. Resource path
106. Service root
107. Inorder to use google in azure active directory as your social identity authentication provider what
type of application must you use- Google+ application with right parameter
108. In visual studio 2017 you have created a .NET MVC app from an ASP.NET 4.5.2 MVC template. You
have specidfied that the template use individual user as authentication method. Which file must you
configure with a client and client secret to use google authentication- Startup.Auth.cs
109. You are configuring the credentials for a web applicationin google console for developers. You
have specified https://localhost:44308 as the origin URI. What must you specify a authorized redirect
URI- https://localhost:44308/signin-google
110. what attribute should you apply to a controller class inorder to ensure that authentication is
enforced – Authorize
111. which types of packages must you install in a project in order to use open web interface for .NET
authentication -OWIN
112. 41)which types of endpoints must you specify in a windows desktop application in order to use
google authentication in your app?
113. 1)Token endpoint
114. 2)authorization endpoint
115. 41)Azure AD business-to-business(B2B) collaboration between which types of organizations?
116. 1)Large organizations
117. 2)Small organizations
118. 41)You are on the Users and groups – All users blade in the Azure portal. You have clicked All users
in the resource menu. Which options are available in the top menu/toolbar for all users?
119. 1)New guest user
120. 2)Multi-Factor Authentication
121. 3)New User
122. 42) What is used in Azure AD to determine if users no longer require access to resources through
group membership?
123. 1)Access review
42) Which of the following are valid identity types that can be created in Azure AD?
1)Devices
2)Software
3)Users
43) What is the default DNS domain suffix for newly created Azure AD tenants?
1) Onmicrosoft.com
43) Which statement regarding multiple Azure AD tenants in the same Azure account are true?
43) Which of the following best describes Azure privileged identity management?
1) Application access
2) Group membership
44) You need to configure an Azure AD access review for app access. What should you search for in the
portal?
1) Identity governance
45)Which of the following are valid controls within user risk policy configurations?
1) Allow access
46) Which Azure AD configuration requires conditions to be met prior to allowing access?
1) Conditional access
46) You need to configure Azure AD conditional access policies. Where in the portal should you click?
47) How are Azure AD security principals related to RBAC and resource groups?
1) Token
48) You want users of your application to authenticate by using their accounts, which are stored in
Microsoft 365. What must you do in Azure AD?
48) In which of the following scenarios would OpenID Connect be the best option?
48) Which process refers to controlling and restricting even the highest level of administrative accounts in
a cloud environment?
49) An object that represents a unit such as the finance department of your company would likely be
configured at which level of the hierarchy of an LDAP?
Organizational Unit
49) Which concept or factor best describes the nature of an identity federation?
tr Trust
49) A key archival server provides which type of functionality in a certificate management process?
50) Using an element such as a fingerprint refers to which component of multi-factor authentication?
50) You are in a company A and you have a resource to share. Your customer B and requires access to your
resource. Which statement correctly identifies or describes provider in a single sign-on configuration
between your organizations?
50) Which component of a public Key Infrastructure is optional, but can be implemented to accept
requests for certificates and handle processes such as vetting?
Registration Authority
51)Which component of security key management uses a dedicated device to store and protect encryption
keys?
HSM
51) During which phase of an incident response would a ticket/or a report be generated?
Identification
52) When responding to an incident, isolation is best used for which purpose?
52)Which process refers to controlling and restricting even the highest level of administrative accounts in a
cloud environment?
53) Which concept or factor best describes the nature of an identity federation?
Trust
53) An object that represents a unit such as the finance department of your company would likely be
configured at which level of the hierarchy of an LDAP tree?
Organizational unit
53)A key archival server provides which type of functionality in a certificate management process?
54) Using an element such as a fingerprint refers to which component of multi-factor authentication?
54) You are in a company A and you have a resource to share. Your customer B and requires access to your
resource. Which statement correctly identifies or describes provider in a single sign-on configuration
between your organizations?
54) Which component of a Public Key Infrastructure is optional, but can be implemented to accept
requests for certificates and handle processes such as vetting?
Registration Authority
55) Which component of security key management uses a dedicated device to store and protect
encryption keys?
HSM
55) During which phase of an incident response would a ticket and/or a report be generated?
Identification
56) When responding to an incident, isolation is best used for which purpose?
To prevent damage from spreading
56) Which identity management capabilities can be provided by Azure Active Directory?
1)Device registration
2) Multi-factor authentication
57) If a user named John Doe creates a new Azure subscription using the address [email protected],
then creates a new user janedoe what is the fully qualified user name of the new user?
1) User
2) Global administration
3) Limited administrator
58)Integrating an application with Azure Active Directory provides which primary capability?
58)Which component of federation metadata is responsible for providing a single-in and single-out URL?
59)For which purposes might you implement the SAML 2.0 protocol?
2) Identity Federation
3) WS- Security
Oauth 2.0
60) The flow of requests and responses between a user’s browser, the application and Azure Active
Directory is determined by which component?
60) Which component of Graph API is capable of checking for changes in a directory without having to
frequently request updates?
Differential Query
60) The URLs used to access resources or entities in Graph API are comprised of four main parts. Which of
these are valid parts comprising a URL used to access resources in Graph API?
1) Resource path
2)Tenant Identifier
4) Service root
60) In order to use Google in Azure Active Directory as your social identity authentication provider, what
type of application must you use?
1) In visual studio 2017, you have created a .NET MVC app from an ASP.NET 4.5.2 MVC template.
You have specified that the template use Individual User Accounts as the authentication
method. Which file must you configure with a ClientId and Client Secret to use Google
authentication? Ans: Startup.Auth.cs
2) You are configuring the credentials for a Web application in the Google console for developers.
You have specified https://localhost:44308 as the origin URL. What must you specify as the
Authorized Redirect URL? Ans: https://localhost:44308/signin-google
3)What attribute should you apply to a controller class in order to ensure that authentication is
enforced? Ans: Authorize
4) Which types of packages must you install in a project in order to use Open Web Interface for
.NET authentication? Ans: OWIN
5) Which types of end points must you specify in a Windows Desktop application in order to use
Google Authentication in your app? Ans: authorization endpoint, token endpoint
7) You are on the Users and groups- All users blade in the Azure portal. You have clicked All users
in the resource menu. Which options are available in the top menu/toolbar for All
users? Ans: MFA, new user, new guest user
10) What are some of the ways to avoid race condition? Ans: by employing mutual exclusion, by
employing atomic operation
11) What can be done in relation to services in order to harden the system configuration?
Ans: encrypt connection strings, eliminate unused services
12) Where should cryptographic algorithms be implemented in order to ensure that software
exhibits cryptographic agility? Ans: within a configuration file
13) What can be done with single quote “ ‘ “ and double dashes “—” when sanitizing user
input? Ans: remove them, substitute them
14) A system is designed to allow a maximum of 50 characters for a username field on the login
form and allow maximum of 3 login attempts before locking the account. What is the clipping
level? Ans: 3
15) Which of these statements accurately described where input validation can be performed?
Ans: at client-side or server-side, at client-side and server-side
16) Where can we log data related to user events? Ans: within a database log, within the event
itself
17) Which of these are well known legitimate types of session attacks that should be modelled and
mitigated? Ans: hijack attack, man in the middle attack
18) Which type of exception handling involves catching specific exceptions within a try
block? Ans: exception filtering
19) Which of these accurately describe safe API coding practices? Ans: access to custom API
should be auditable, all requests should be authenticated
20) Which statements describe static type safety? Ans: datatypes are assigned during design,
compiler catches type errors
21) In the context of memory management, which are valid code classifications? Ans: unmanaged
code, managed code
22) Instead of hard coding our application with a specific algorithm or encryption key, we treat
this information as parameter data. What is the name applied to this approach to configuration
parameter management? Ans: cryptographic agility
23) Which statements describe tokenizing as a defensive coding practise? Ans: it works because
the tokenized data has no external context, when tokenizing we replace sensitive data with
symbols
24) How does a sandboxed environment provide a safe and secure environment in which to run
software? Ans: it limits access to resources on the host system, it limits access to resources on the
host OS
25) Which Microsoft 365 administrator role can change the password of a user who’s assigned to
the Microsoft 365 Global administrator role? Ans: Global administrator
26) When passwords are changed in Microsoft 365, they can be written back to the on-premises
Active directory. Which of the requirements must be met to enable this feature? Ans: you need an
azure active directory premium license
27) What is the prerequisite to implement conditional access policies? Ans: purchase an azure ad
premium license
28) Which statements reflects Microsoft 365 password settings? Ans: passwords expire after 90
days and users receive an expiration notification 14 days before it occurs
29) To implement self service password reset, which conditions must be in place? Ans” password
reset is only available for Microsoft 365 users with cloud identities that have passwords that aren’t
linked to the on-premises AD DS
30) Which items must you define as part of internal user policy? Ans: internal users who are
eligible to request access
31) Which of the options is the name for a collection of permissions that determine what
operations are allowed on a resource? Ans: role
32) Which are default roles created automatically in your GCP project? Ans: owner, editor, viewer
33) Which option is available for you to determine which permissions you are granting via a new
role, without creating the role? Ans: simulate
34) Which options are valid launch stage for deploying new roles? Ans: GA, ALPHA, BETA
35) Which role is required by user to administer all the custom roles for a project? Ans: role
administrator role
36) Which types of files are used to deploy a new custom role via GCP deployment manager?
Ans: .jinja, .json
37) Which options are true regarding service accounts in GCP? Ans: it is associated with RSA-key
pairs, service accounts are not members of google workspace domain, you can let other users
impersonate a service account
38) When generating and downloading the private key for your service accounts, which formats
can you create the key type in? Ans: P12, JSON
39) To view service account details such as usage and service account usage per API , which
option can you view within the service account console? Ans: metrics
40) To grant access to a service account in another project, which piece of information about the
service account must we save to reference it in the new project? Ans: service account email
address
41) When viewing service account logs, what are the two types of logs that are created and
available for you to view? Ans: change logs, usage logs
42) Which options are available as identity provider in GCP? On premises active directory, azure
active directory, amazon web services
43) This feature is used to organize and manage external identities and is the first thing usually
created when implementing workload identity federation? Identity pool
44) When creating conditional role bindings, what are the top level available condition types that
you can select from? Time, resource
45) What are the external threats in cloud computing that need to be considered to secure cloud
services? Man in the middle attacks, distributed denial of service attacks
46) What are the access control mechanisms that can be used to apply granular authorization on
cloud services? RBAC, MAC
47) Which authentication mechanism is provided by cloud providers to control access to cloud
services? Trust, TTP
48) Identify the mechanisms that can be configured using identity and access management
services provided by public and cloud providers? Authentication, authorization
49) Which framework can be used to implement single sign on capability? Kerberos, SAML
50) What are the different types of MFA that can be configured to secure the cloud and fulfil
compliance requirements? Hardware token, SMS token
51) Identify the desisn principles that need to be considered while implementing the Federated
authentication and authorization mechanism in the cloud? Decentralization, SLA and QoS
commitment
52) What are the objects that need to be configured to implement role based access control in
AWS? Group, role
53) Which default groups provided by AWS can be used to configure users and the associated
required permissions? Developers, administrator
54) What are the different MFA that can be configured to implement MFA using IAM? U2F
security key, virtual MFA devices
55) Which common ciphers can be used to map security standards by applying the right data
encryption mechanism? DSA, 3DES
56) Cloud compliances that apply to data driven policies of consumers’ data in the cloud? GDPR,
PCI-DSS
56) What are the security implementation that can be applied to secure enterprise data in the
cloud deployment model? Data encryption, SSH network protocols
57) Which description best describes an AWS IAM policy? Collection of related permissions
58) Statements regarding IAM roles are correct? Roles can be associated with EC2 instance after
creation, roles can be associated with EC2 instances during creation
59) You are auditing user access to AWS resources. Which tool should you use? IAM policy
simulator
60) What constitutes MFA? Multiple authentication factors from different categories
61) You are enabling MFA for an IAM user. Which is a valid option? Scan QR code
62) Which AWS directory service option is based on linux and SamBA? Simple AD
63) You need to join an existing EC2 instance to an AWS simple AD domain. What must you
do? Modify DNS server IP address in the EC2 instance
64) You have joined EC2 Windows instance to an AWS Simple AD domain. You want to add users
to the domain. What should you do? Use standard AD tools within the EC2 instance
65) Which phrase is the most closely related to Amazon Cognito? Access control
2. What is considered the new parameter when considering the effort to secure users access to
company assets, resources and data? – user identity
3. True or false? Cyberark identity requires the use of a third party MFA vendor in order to
incorporate MFA for identity assurance- false
4. Cyber ark identity can enable MFA for SSO for which of the following : on- premise applications,
SAS cloud application, VPNs, all of the above
5. Login suffix – customizable part of a username, tenet URL – customizable web address , email
templates – support for over 15 languages, account customization- change portal colors logos an
d images
6. The cyber ark identity connector must be installed on the domain controller – false
7. Cyberark requires an additional agent to be installed to perform integrated windows
authentication? – false
8. How does cyberark identity (idaptive) secure user’s access to apps and data regardless of their
account source of truth – accounts are provisioned their applications from a single identity
management platform
9. The regesterd connector user must have which of the following permissions- full system admin
permissions in the cyberark identity platform
10. Cyber ark identity platform performs which of the following enables services – active directory
authentication, app gateway services, IWA , all of the above
11. Which roles are included by default – everybody and system administrator
12. When you see an active directory account on the user’s table it means the account was
duplicated into the cloud directory – false
13. What is the most important thing to remember about policies – policies apply from the top
down with highest priority on top of the table
• When it comes to provisioning which of the following is considered as best practice- Assigning
application using “everybody ” role for all the general apps used within the organization like
outlook
• End user can create their own apps in cyberark identity platform using portal – true
• The infinite apps capture utility exits in which of the following browser extensions for cyberark
identity – firefox
• What option exists if an organization wants to grant access to on premise web apps without the
use of VPN –app gateway
• The requests and approval workflow is limited to one approver – false
• Using the mobile authenticator for MFA requires which of the following
1. Cyberark identity app is installed on the mob device
2. The device is enrolled into the platform and registered to the user
• The ability to add MFA infront of applications applies to which of the following – Both cloud and on
premise apps for any assigned user
• Which of the following is true reg context based, adaptive authentication from cyberark identity
1. Users can be challenged based on time of day
2. Users can be challenged depending upon whether they are on or off the corporate network
3. Users can be challenged based upon their role membership
• End users can create and add these types apps to their own portal as personal apps- User
password apps
• Which of the following is true about MFA and end users
1. Mfa option is visible to endusers will depend on which factors configured
2. Mfa option is visible to endusers is determined by authentication profile associated with the
MFA policy
3. Admins can block users from using security questions
• The ability to add MFA in front of applications applies to which of the following – Both cloud and
on premise apps from any assigned users
2) Which best describes the relationship between a subscription and an azure AD directory? Azure
AD directory can be associated with multiple subscriptions but a subscription is always tied to a
single directory.
4) If you delete a user account by mistake, can it be restored? The user account can be restored but
only if it was deleted within the last 30 days.
5) What kind of account would you create to allow an external organization easy access? A guest
user account for each member of the external team.
6) Which describes OpenID Connect? OpenID Connect is an authentication standard
7) You want users of your app to authenticate by using their accounts which are stored in Microsoft
365. What must you do in Azure AD? Register the app in Azure AD.
8) Scenarios where OpenID Connect will be best? Securing your sign in page
11) You must activate MFA for all users in the directory you enable it in False
12) What operating systems do azure AD registered devices support? Windows 10, iOS, Android and
MacOS
13) What device security sign in options does Azure AD join support? An azure AD work account with
password or windows hello and MFA
14) When conditional access applied? After first factor authentication
15)what provisioning options are available through azure AD join? Self service by using windows
out-of-box experience (OOBE), windows autopilot or bulk enrollment
16) what happens when a device isn’t in the MDM scope? Azure ad join finishes without the enrolment to
MDM.
17) What is classified as stale data? Any data that hasn’t been accessed for one year or more
19) when is a user considered registered for SSPR? When they’ve registered at least the number of
methods that you’ve required to reset a password
20) When you enable SSPR for your Azure AD organization? Users can reset their passwords when they
can’t sign in
21) What types of custom domain names are supported? Any registered domains that aren’t already
being used
22) Which resources can a custom domain Azure AD account access? Both internal and external resources
23) How do you verify domain ownership? The azure portal provides a TXT or MX record you add through
your DNS provider
24) What is the default domain name before a custom domain is created? companyname.onmicrosoft.com
25) What should you do if domain name verification fails? Wait at least an hour, then check that the data
is correct with your domain registrar
26) How many Azure AD organizations can use a single domain name? 1
1) Which PowerShell command could you use to add a user? New-ADUser
2) What scope of group can be assigned permissions anywhere in an ADDS forest and can have
members from anywhere in the forest? Universal
3) What type of trust relationship is automatically created between the domains Contoso.com and
Seattle.Contoso.com? A parent and child two-way transitive trust
4) Which of the following is a built-in container in an AD DS domain that can hold computer
accounts? The domain controllers OU
5) What tool allows the transfer of the Infrastructure Master operations master role? Active
Directory Users and Computers
6) Which tool can you use to trigger an AD DS schema update? ADSI.MSC
7) When deploying the first domain controller in a forest by running the active directory domain
services configuration wizard, which of the following options is configured by default? Global
catalog
8) What does global catalog contain? A copy of all objects and some of their attributes from all
domains in an AD DS forest
9) Which of the following operations master is a forest -level operations master? Domain naming
10) When establishing a forest trust relationship and selecting the This Domain Only option, what
information needs to be provided? Trust password
11) Which tool can be used to create, list and delete a custom application partition? ntdsutil
12) What functionality does the transitivity of a two-way forest trust provide? All domains in both
trusted forests trust each other
13) How should a trust between an ESAE forest and a production forest be configured? One-way with
selective authentication and the production forest trusting the ESAE forest
14) Which of the following tools can be used to monitor and troubleshoot AD DS replication?
Dcdiag.exe
15) Which of the following statements regarding installation of the ADDS Enterprise Root CA is
correct? You can modify the hash algorithm of the CA cryptography
16) Which tool can be used to allow certificate enrollment by using an already configured template?
The certification authority console
17) What is required to publish a CRL to a file share by using the Certification authority console?
Configure the extensions settings of the CA
18) Which CA component works as a proxy client between a computer running windows and the CA?
Certificate Enrollment Web Service (CES)
19) Which Enterprise CA functionality isn’t available when using Standalone CA? automatic approval of
certificate requests
20) Which of the following conditions must be satisfied to use certificate templates? You must
implement an Enterprise CA
OKTA
1. Single Sign-On is the task of managing the duration and life of a digital identity. False
2. Is this a factor which promoted the adoption of Active Directory? There may be more than
4. An Identity Provider or IdP is: the entity that authenticates the user.
5. The Okta Integration Network (OIN) includes the following types of applications:
a) Directories
b) HR applications
c) Email clients
d) All the Above
6. Who is in charge of managing the password policy for Okta-Sourced accounts? An Okta Super
Admin or Organization Admin
7. Can you add custom attributes to the CSV template file before importing people records? No
8. Can you update existing users using the CSV template file? Yes
9. Which 4 attributes are required by default when creating a new Okta-Sourced account?
Username, last name, first name, and primary email
10. Which is a requirement for an Okta account? By default, the username must be in the form
of an email address.
11. What are the server requirements for the Okta Active Directory agent?
13. How are Active Directory groups created in Okta? They are copied through the Active
Directory agent import.
14. What is the best practice for installing Okta Active Directory agents?. To install at least 2 Okta
Active Directory agents per domain
15. Where does Okta import Accounts and Groups from?
Organizational Units (OUs)
16. In the LDAP installation process, the Root DN is a required parameter. True
17. How are Directory-Sourced people authenticated? Against the local on-premise directory
18. What are the server requirements for the Okta LDAP agent?
Windows Server 2008 R2 or newer
Windows server must be able to reach the LDAP host and port
Linux-based agent must be installed on an RPM enabled Linux distribution
All the above
19. The Okta LDAP agent supports: Just-in-Time provisioning only
20. What are the required accounts needed to install your LDAP agent?
A designated Okta Administrator account
A local LDAP service account
A designated LDAP user
All the above
21. Which of the following is not an SSO method for connecting to applications? Active directory
22. What does the label Okta Verified next to certain applications in the OIN mean?
It means that the application was created by Okta engineers or by Okta community users,
then tested and verified by Okta.
23. Select the three distinct roles involved in the SAML flow.
SP
End User
IdP
25. If I want to allow my end user to enter their own credentials for their applications, which of
the following SWA Sign-on options should I select? User sets username and password
26. Provisioning features will always be available as long as you use a SAML connection to a
Service Provider. False
27. What determines whether or not provisioning features are available for an application?
Service provider
28. Okta admins can prevent end users from adding their own consumer apps. True
29. What does the term “Okta Verified” mean for an application? The application was created
by Okta community users and then tested and verified by Okta engineers.
30. A SAML connection to a service provider is more secure than a SWA connection. True
31. Which of the following are benefits of using Workflows instead of writing custom code?
32. Which of the following use cases does Okta's Workflows address?
33. A connection refers to a unique access level for a specific user to that application. True
35. Which of the following is a type of event available with Okta's Workflows? There may be
Application
Schedule
Child Flow
40. What is the first step in setting up MFA? Select what factors you want to use.
41. When working with Office 365, when should you federate? You should federate after you
What are the various provisioning types you can choose from when working with Office 365? You
can pick more than one answer. Universal Sync, profile, user, Licenses/Role Management only
42.
43. Before provisioning users which two attributes are critical to verify the data mappings and
44. Which provisioning options could be used for cloud-only users? You may pick more than one
45. You can configure WS-Federation yourself using PowerShell or let Okta configure WS-
46. Of the 3 groups, the Security team need to know policies and rules are respected. True
47. APIs hidden within a mobile application are safe because no one knows about them. False
48. Which of the following serves as an API "traffic cop" to protect APIs from malicious data,
49. The Resource Server is what applies authorization policy and is fulfilled by Okta API Access
Management. False
50. The Client is the application the user interacts with. It can communicate with servers on the
51. Advanced Server Access is best suited for the following use cases:: Linux Servers in the Cloud
52. The credential mechanism used to login to servers is: Short-lived client certificates
53. Which of the following Okta products does Advanced Server Access integrate natively with?
55. A Project in Advanced Server Access is defined as the authorization scope of who can access
to examine all incoming traffic to a web server? Select all that apply. Webserver plugin, a
57. If a user accesses an app from Okta's end user dashboard, then an IdP-initiated flow is kicked
off. True
58. Okta's Access Gateway delivers Single Sign-On (SSO) and Adaptive Multi-factor
Authentication (AMFA) from the cloud to on-prem apps without changing how those apps
work. True
59. Access Gateway uses Attributes to define what URLs are public or secure within an
organization. False
60. What is the most common way to integrate WAM with an app? Header based authentication
61. You want to store a value from an Active Directory attribute in the Okta user profile, but your
Okta user profile does not already contain a similar attribute. What should you do?
Add a custom attribute to the Okta user profile and then map it to the AD attribute.
62. Universal Directory allows you to construct custom Okta usernames or application usernames
63. Which Okta feature can you use to add custom attributes to your Okta user profile? Profile
editor
64. If Active Directory is disabled as the Profile master, user updates you perform in Active
Directory will be pushed back to the user in Okta after a scheduled import is processed. False
65. Which of the following are examples of a valid profile type when working with Universal
Directory. You may pick more than one. Application Profile, identity provider
67. Okta Advanced Server Access protects the server in your cloud infrastructure by employing
Ephemeral credentials for each login, which eliminates the need for static keys.
Stronger Authentication—MFA
Application
People
Policy
Group
Configuration
Expose functions for 3rd-party developers to build custom mobile app to engage with
consumers
-Adaptive MFA
71. Which of the following is the no-code way to integrate Okta authentication to your
application?
72. When integrating with your enterprise partners, which of the following methods will create
Self- registration
1) Which of the following are examples of a valid profile type when working with
Universal Directory. You may pick more than one. Application Profile, identity
provider
What is the term for reading application data into IdentityIQ from external sources?
Aggregation
2) What is the term for reviewing an identity’s accounts and entitlements on the applications
within your enterprise?
Certification
5) Implements can add custom business logic to identityIQ using what functionality?
Rules
6) Accelerator Pack guides implementation teams to use best practice standards when configuring
governance an provisioning processes
True
9) The critical network performance zone is between the user’s browser and identityIQ. It requires
a round trip latency of 3ms or less
False
10) The Services Standards Build(SSB) is a deployment process provided by Sailpoint that is required
when deploying IdentityIQ.
False
12) When you add extended attributes that are not marked searchable to IdentityIQ, where are
these new attributes stored by default?
In a CLOB
13) Before you log in to identityIQ using your browser, the application server must be running
True
14) Authoritative Identity Cubes are created for each account read from all applications
False
15) Refresh tasks process data on Identity Cubes and updates them. Aggregation tasks read account
information into IdentityIQ from external applications
True
16) The Terms Identity attributes and Account attributes refer to the same thing
False
19) Entitlements define which areas of the UI a user can access within IdentityIQ.
False
20) By adding an identity to a workgroup, the identity inherits capabilities assigned to the
workgroup
True
23) A group can be defined based on multiple attributes; a population is based on a single attribute
False
25) Which statement best describes what happens when you click Save Identities as Population?
The search criteria for the population is saved
26) Account schemes define which account attributes to read from an application when aggregating
accounts with identityIQ
True
27) If we want to add an entitlement to the entitlement catalog, what should we mark the
corresponding account attribute as?
Managed
28) After aggregating, entitlements are added to the Entitlement Catalog, but they are not fully
promoted on Identity Cubes until a refresh task has been run
True
30) The JDBC connector requires a provisioning rule to be written when provisioning to applications
of this type
True
31) Many identityIQ connectors include predefined account and group schemas
True
32) In advanced Analytics, users will have different search type options, depending on their
IdentityIQ capabilities
True
33) We discussed two ways to view your application data prior to aggregation.
Preview only lists the first 10 records, while Connector Debug lists all records and more details.
34) Accounts are correlated to existing Identity Cubes when the Prune Identity task is run
False
35) Manual correlation will link an account to an identity cube, but only until the next aggregation of
that application
False
36) When a policy violation is identified, a workflow can be identified by IdentityIQ to address the
violation
True
40) The Perform Maintenance task must run for the certification process to complete
True
41) You can exclude certain users (such as executives) from a certification campaign by using
An exclusion rule
Identity Cube –-- Represents our users – any access-holding entity or person; a unique identity stored in
the repository
Application ---- Any data source with which IdentityIQ communicates to manage governance and
compliance for your enterprise
Aggregation ---- The task which discovers and collects information from the applications configured to
work with IdentityIQ
Refresh ---- The task which updates Identity Cubes. Can also be used to trigger other actions (e.g.
attribute synchronization, detecting policy violations)
Correlation ---- The process of matching objects ( accounts or managers) to identity cubes
Entitlement ----- What type of access is associated with a user’s account, for example, capability =
process payroll or a group membership
44) You can use the Administrator Console to postpone a scheduled task
True
2. Select the elements that make up the Java Runtime Environment (JRE).
Java class libraries
Not selected
Correct answer.
3. Select the two system environment variables that are set when installing Oracle JDK on Linux.
PATH
Selected
You were right. You selected this correct option.
JAVA_HOME
Selected
You were right. You selected this correct option.
java OrderClass
Not selected
Correct answer.
Operations
Selected
You were right. You selected this correct option.
Data
Selected
You were right. You selected this correct option.
9. Select the modifiers and type that must be provided to the Java main method.
public
Not selected
You were wrong. You did not select this correct option.
void
Selected
You were right. You selected this correct option.
static
Selected
You were right. You selected this correct option.
10. Select the usual destination for Java output when using System.out.println.
Standard output
Not selected
Correct answer.
Missing semicolon
Selected
You were right. You selected this correct option.
Unmatched brace
Selected
You were right. You selected this correct option.
Unrecognized keyword
Selected
You were right. You selected this correct option.
2. Given the following variable declarations, what variable type should be used for the product of
quantity * price?
int quantity = 2;
double
Selected
Correct answer.
System.out.println(phone.substring(3, 6));
-54
Not selected
Correct answer.
6. Which of the following will result in a compile failure?
int a = 7;
int b = 3;
System.out.println(a / b);
2
Not selected
Correct answer.
Instruction: Rank the following items in the correct sequence. Drag the item where you want to place
it. For using with keyboard, Tab to navigate to your selection. Use space bar to select and up and
down arrows to change the order.
int c = 50 – 8 * 2 / 4 – 8 + 3
41
Not selected
Correct answer.
10. Which of the following statements correctly assigns the value “Bob wrote 3 Java programs.” to the
msg variable?
true
Selected
You were right. You selected this correct option.
boolean largeVenue;
if (attendees >= 5) {
largeVenue = true;
else {
largeVenue = false;
int hoursNeeded = 5;
int hoursAvailable = 5;
int hoursRemaining;
if(hoursAvailable > 0) {
if(hoursRemaining < 0) {
} else {
if(hoursRemaining != 1) {
suffix = "s";
System.out.println("You will have " + hoursRemaining + " hour" + suffix + " remaining.");
} else {
System.out.println("Times up.");
6. Which of the following will initialize the names array to be three elements?
String[] names = { “Steve”, “Mary”, “William” };
Selected
You were right. You selected this correct option.
System.out.println(ages[2] + “ “ + ages[1]);
48 37
Not selected
Correct answer.
8. Given the following loop code, what is the name of the array being iterated over?
ages
Not selected
Correct answer.
Given the following loop code, how many iterations will be performed?
4
Not selected
Correct answer.
3. Given the following code, select the answers which best describe the type of variable `alice`.
Reference variable
Not selected
You were wrong. You did not select this correct option.
Object reference
Selected
You were right. You selected this correct option.
4. Given the analogy of a `remote` to control a camera, what does this describe in Java?
myShirt = yourShirt;
myShirt.colorCode = 'R';
yourShirt.colorCode = 'G';
System.out.println(myShirt.colorCode);
G
Not selected
Correct answer.
8. Select the answer which describes how Java arrays are stored in memory.
new
Selected
Correct answer.
No type is specified
Selected
Correct answer.
11. What is a value passed into a method called?
Argument
Not selected
Correct answer.
12. Given a function that specifies a return type of void, what will it return?
Nothing
Not selected
Correct answer.
Return type
Not selected
You were right. You did not select this incorrect option.
14. Given the following code, what is the scope of the `price` field?
price = thePrice;
return price;
}
The Shirt class
Not selected
Correct answer.
1. Specifying the static modifier applies which properties to class methods or variables.
2. Select the description which describes the problem with the following code snippet.
return name;
3. What happens if someone attempts to change the value of a constant after it has already been
assigned a value?
Integer.parseInt
Selected
Correct answer.
7. Given the following code snippet, what code is used to set the price of item?
this.price = price;
…
Item item = new Item();
item.setPrice(10.00);
Selected
Correct answer.
10. What keyword is used to call an overloaded constructor from another constructor?
this
Not selected
Correct answer.
11. Select the description of how object references are passed to methods.
changeShirtColor(myShirt, 'B');
theShirt.setColorCode(color);
return theShirt;
1. Select the methods used to test for the equality of String values.
===
Not selected
You were right. You did not select this incorrect option.
equalsIgnoreCase
Selected
You were right. You selected this correct option.
test
Not selected
You were right. You did not select this incorrect option.
=
Not selected
You were right. You did not select this incorrect option.
2. What does a negative return value indicate when calling the compareTo method on a String?
mutable
append
Selected
Correct answer.
String[]
Not selected
Correct answer.
6. Given the regular expression ‘\\s+’, which characters will be used for splitting words?
hyphens
Not selected
You were right. You did not select this incorrect option.
7. What is the result of the following String replace?
“a cat is in a aatre”
Not selected
Correct answer.
8. Match the integral primitive type with its size.
8-byte
16-short
32-int
64-long
int result = 31 % 4;
3
Not selected
Correct answer.
10. Select the combined assignment operator equivalent to the following code.
size += diff;
Selected
Correct answer.
subclass
Not selected
You were right. You did not select this incorrect option.
super
Not selected
Correct answer.
3. Which is a valid override of a parent method with signature, public void myMethod(): string?
public void myMethod:string
Not selected
Correct answer.
4. Given a class with multiple constructors, which keyword is used to invoke another constructor of the
same class?
this
Selected
Correct answer.
5. Which are valid instance declarations, given a parent class Clothing and a child class Pants?
(MyType) myInstance
Not selected
Correct answer.
Can be instantiated
Not selected
You were right. You did not select this incorrect option.
3. What is the unwinding of the sequence of method calls typically referred to as?
The stack trace
Not selected
Correct answer.
4. What happens to an exception when it is propagated all the way up the call stack without being
handled?
The jvm outputs the exception and a stack trace for the exception
Not selected
Correct answer.
try {
myIntArray[5] = 25;
System.out.println(“one”);
System.out.println(“two”);
} catch (OutOfMemoryError oom) {
System.out.println(“three”);
} catch (Exception e) {
System.out.println(“four”);
four
Not selected
Correct answer.
8. Which exceptions are shown in the throws section of a method’s documentation in the Java API?
10. What are the poor exception handling practices in the following try/catch block code snippet?
try {
createFile(“/path/to/file”);
} catch(Exception e) {
The catch clause catching an Exception type rather the specific type
Selected
You were right. You selected this correct option.
The catch clause does not analyze the Exception
Selected
You were right. You selected this correct option.
11. If a checked exception is not caught, how can it be sent higher up the call stack?
12. When does the finally block get performed when included with a try/catch block?
Always after the try and catch blocks, if any, have been executed
Selected
Correct answer.
1.
components of okta org – application and people
2. Just in time provisioning allows okta to create, active and update a directory source account
when the person associated with the account logs into okta – true
3. okta ad agent can only be installed on a member server in domain? False
4. what are the server requirements for okta ad agents- windows server 2018r2, 256mb RAM, host
machine e is member server in domain
5. which of the following are benefits of using work flows instead of writing custom code-
a) Run IQService.exe-i
b) Run IQService.exe-t
c) Run IQService.exe-s
d) Run IQService.exe-k
a) False
b) True
a)Joiner
b)Leaver
c)Reinstate
d)None of the above
a) True
b) False
a) Yes
b) No
7) Identify types of identities from the following?
a) Employee
b) Contractors
c) Painters
d) Customers
a) True
b) False
a) Aggregation
b) Correlation
c) Certification
a) Spadmin
b) Admin
c) Iiq
d) Sailpoint
11) Command to execute the DDL scripts for MySQL would look like?
a) mysql>source create_identityiq_tables.mssql;
b) mysql>source create_identity_tables.mysql;
c) mysql>source create_identity_tables.sql;
d) mysql>source create_identity_tables.db2;
a) Permissions
b) Ownership
c) Rules
d) Data
a) Manage Password
b) Manage Identity
c) Manage Access
14) Which of the following are valid parameters to calculate application risk score?
a) Dormant account
b) Privileged accounts
c) Inactive accounts
d) Application user’s policy violations
15) What will be the value assigned to variable x as per below expression?
Int X =(5+3/4.0-4/2)*10-5;
a) Debug
b) Info
c) Warn
d) Error
e) trace
f) All
a) Attributes
b) Accounts
c) Entitlements
d) Roles
19) Which file to update for identity Attribute to configure the number of extended and searchable?
a) ManagedAttributeExtended.hbm.xml
b) ApplicationExtended.hbm.xml
c) IdentityExtended.hbm.xml
d) LinkExtended.hbm.xml
20) To create spadmin in identityIQ which file to import?
a)spadmin.xml
b)user.xml
c)init.xml
d)identity.xml
RETEST1:
1) Session time out can be configured in forgerock AM in the scope – global
2) Which of there are core capabilities of forgerock am- All of the above
3) Which of the following is an effective way to prevent brute force attack- configuring
account lockout after 5 incorrect attempts
4) Which option is available to configure authorization – network security and Role based
access control
5) What is the purpose of data labeling- used to determine the level of protection needed
6) Most ideal for outh 2.0 – all of the above
7) What are the interactive ways of capturing credentials from user- identity manager,
LDAP, rsa secure ID
8) If open ID scope is mentioned which of the following token is returned in the end point-
ID token, access token , refresh token
9) Considering below OUTH tree structure will forgerock AM be able to generate user
session : START > USERNAME COLLECTER > SUCCESS – false
10) Which chart can help to determine the effectiveness of biometric implementation in an
organization – zephyrs chart
11) Which of these are lifecycle events in identity IQ- mover, joiner, leaver
12) What is the extension of file which is used for java source code file name - .java
13) Which lcm event will be triggered when the user is reheard- reinstate
14) What will be the console output of the below code x= 2,3,4,5,6,7: 34
15) Output of the following x(2) <= 3: Hi
16) What is an assigned rule :
17) Which terms describes the collecting data from application or source in sailpoint:
aggregation
18) Refresh task can be triggered by lifecycle event: false
19) To create SP admin in identity IQ which file is to be imported? :init.xml/ init lcm
20) What is role based provisioning - provision set of entitlements which are part of the
role
21) Cyberark requires an additional agent to enable integrated windows authentication –
false
22) An RODC is a special, read only installation of AD DS RODCs are common in branch
offices where physical security is not optimal: true
23) Is it possible to apply group policies to containers in AD DS? NO
24) What are the physical components in AD DS: domain controller, site and subnets
25) You can email report as attachment to selected identities in what format: csv/pdf
26) In cyberark identity policies apply from top to bottom with highest priority on top of the
table: true
27) Which of the following is common within an AD DS forest?
28) You need to assign local domain users with permissions anywhere in the forest. Which
AD group scope will you use? Universal
29) Which all best security layers are at the heart of privileged access security solutions –
firewall, vpn, authentication, access control, encryption
30) Which claim on azure AD open ID connect payload identifies the intended recipient of
the token –AUD
31) If a user accesses a SAML app from okta’s enduser dashboard that flow is? IDP initiated
32) Each okta org is a ______ in okta identity cloud – tenant
33) Bulk password reset cannot be performed on okta master users? True
34) When you build a policy you have to create a rule associated with the policy – true
35) In the LDAP installation process the root DN is a required parameter – True
36) Which of the following is not an SSO method for connecting to application – Active
directory
37) How okta API token can be prevented from expiring - perform an action that requires
the use of API token
38) Where does okta import accounts and groups from – organizational unit
39) Is this capability available for pre integration application on the OIN- all of them
40) Does okta support this type of operation on an okta sourced user -
1) Okta Active Directory agent can only be installed on a member server in domain.
a) True
b) False
a) 8 character
b) 16 character
c) 30 character
36. Okta-Sourced people can only be added to Okta groups( groups created in Okta)
a) true
b) false
34. Will CSV Bulk import support update of existing user record?
a) Yes
b) No
30. When an attributes change comes through aggregation, attribute synchronization is initiated
through a refresh task that has the synchronize attributes options selected Is above statement valid?
a) True
B) False
40. Which of the following is no code way to integrate Okta authentication to your application?
b) Okta SDK
d) Okta API
c) User will face trouble signing until their passwords are replicated
a) true
b) false
a) Corrector
b) Application gateway
c) Cloud gateway
a) True
b) False
25. CyberArk identity can enable MFA for SSO on the following
a) On-premises application
c) VPN
d) None
26. Command to execute the DDL scripts for MySQL would look like
33. Just-in-Time provisioning allows okta to create, activate and update a Directory- Sourced account
when the person associated with the account logs in to Okta
a) True
b) False
a) Amster
b) dsconfig
c) status
d)ldapmodify
21. CyberArk EPM uses HTTPS protocol for communication between endpoint and server
a) False
b) True
a) Implicit flow
b) ROPC
d) client credentials
Class Main(
System.out.println(b/a +5);
}
}
22. Using what strategy administrative task are carried out by administrators who have
administrative credentials?
a) the least privileged user account
b) thread protection and defussion