Question 1:
Describe in detail the functionality of the main modules of the Automated Identity and Access Management System.
Question 2:
Describe briefly the vulnerability exploited by the following access control threats and their possible countermeasures (i) Phishing and (ii) botnets.
Question 3:
Describe what is meant by the term ‘single sign-on’ in the context of access control? Provide three instances of single sign-on technologies.
Question 4:
Explain and discuss how the Kerberos authentication process work and outline the main constituents in the Kerberos environment, their respective functions and the level of security provided by Kerberos. Draw a diagram supporting your explanation.
Question 5:
Explain and describe the authentication procedure in synchronous token system?