Domain 5 – Identity and Access Management
please respond to one or more of the following questions.
- Describe the controls contained within the three Access Control categories that can be integrated within a defense-in-depth model and give an example of one that you have read about or have knowledge of from your own experience.
- Describe three threats to Access Control from what were covered within the reading and give an example of each.
- Describe three of the intrusion detection system types used in access control monitoring covered within the reading. What is a honeypot and what are the legal concerns with using them?
- What are the challenges that an Identity and Access Management system helps overcome? What benefits does it provide?
- Describe the process of Identification, Authentication, Authorization, and Accountability. What is a race condition?
- Discuss the single sign-on technologies Kerberos, security domains, directory services and thin clients. What does federation provide?
Domain 6 – Security Assessment and Testing
please respond to one or more of the following questions.
- Describe the steps in the information system security audit process.
- Describe the differences between Black box, White box, and Gray box forms of vulnerability and penetration testing.
- What are the five steps a team goes through when conducting a penetration test? What are the three degrees of knowledge that a penetration team can have about the target?
- Discuss any three of the commonly exploited vulnerabilities targeted in penetration tests and the appropriate countermeasures to mitigate them.
- Discuss the various test types that Operations and Security Departments should carry out to monitor the environment’s vulnerability to attack.
- Define the following KPI terms: factor, measurement, baseline, metric, and indicator. What is the difference between a KPI and KRI?
- What are the key elements that should be included in a good technical audit report? What should be included to provide senior management a brief overview of the report highlights?