4. Networks and Security

Authentication — Quiz

Test your understanding of authentication with 5 practice questions.

Read the lesson first

Practice Questions

Question 1

In a system implementing a Role-Based Access Control (RBAC) model, a user is assigned to multiple roles. If one role grants 'read' access to a resource and another role denies 'read' access to the same resource, how is the effective permission typically resolved in a conflict scenario?

Question 2

Consider a scenario where a company uses Single Sign-On (SSO) for its employees to access various internal applications. If the central identity provider (IdP) experiences a denial-of-service (DoS) attack, what is the most significant immediate impact on the employees' ability to access these applications?

Question 3

A security architect is designing an authentication system for a highly sensitive government database. The requirement is to ensure that even if one authentication factor is compromised, the system remains secure. Which combination of authentication factors would provide the strongest resilience against compromise, adhering to the principle of 'defense in depth'?

Question 4

In an Attribute-Based Access Control (ABAC) system, access is granted based on a dynamic evaluation of attributes. Consider a rule that states: 'A user can 'read' a document if their 'department' attribute matches the document's 'department' attribute AND their 'security clearance' attribute is 'Top Secret'.' If a user from the 'Marketing' department with 'Confidential' clearance attempts to read a 'Top Secret' document from the 'Sales' department, what is the outcome?

Question 5

A company is implementing a new access control policy for its critical infrastructure. The policy dictates that access to control systems can only be granted to specific individuals who have undergone specialized training and are on an approved list, and this access must be explicitly reviewed and re-approved every 24 hours. This strict, non-discretionary approach, where access is based on explicit rules and security labels, aligns most closely with which access control model?
Authentication Quiz — A-Level Information Technology | A-Warded