DEV Community

Khadijah (Dana Ordalina)
Khadijah (Dana Ordalina)

Posted on

Centralized Management and LDAP

1.

Question 1

Which of these are examples of centralized management? Check all that apply.

Role-based access control

Correct
Right on! Role-based access control makes it easier to administer access rights by changing role membership and allowing for inheritance to grant permissions (instead of granting each permission individually for each user account). Centralized configuration management is an easier way to manage configurations for services and hardware. By centralizing this, it becomes easier to push changes to multiple systems at once.

Centralized configuration management

Correct
Right on! Role-based access control makes it easier to administer access rights by changing role membership and allowing for inheritance to grant permissions (instead of granting each permission individually for each user account). Centralized configuration management is an easier way to manage configurations for services and hardware. By centralizing this, it becomes easier to push changes to multiple systems at once.

2.

Question 2

Which of these are components of an LDAP entry? Check all that apply.

Uncommon Name
Common Name

Correct
Wohoo! The Common Name contains a descriptor of the object, like the full name for a user account. A Distinguished Name is the unique name for the entry, and includes the attributes and values associated with the entry.

Organizational User
Distinguished Name

Correct
Wohoo! The Common Name contains a descriptor of the object, like the full name for a user account. A Distinguished Name is the unique name for the entry, and includes the attributes and values associated with the entry.

3.

Question 3

What does the LDAP Bind operation do?

  1. Modifies entries in a directory server
  2. Looks up information in a directory server
  3. Authenticates a client to the directory server
  4. Changes the password for a user account on the directory server

Correct
Awesome! A client authenticates to a directory server using the Bind operation. This could either be: (1) an anonymous bind; (2) a simple bind, where the password is sent in plaintext; or (3) an SASL bind, which involves a secure challenge-response authentication scheme.

4.

Question 4

Which of the following are authentication types supported by the LDAP Bind operation? Check all that apply.

Anonymous

Correct
That's it! Bind operations support three different mechanisms for authentication: (1) Anonymous, which doesn't actually authenticate at all, and allows anyone to query the server; (2) Simple, which involves sending the password in plaintext; and (3) SASL, or Simple Authentication and Security Layer, which involves a secure challenge-response authentication mechanism.

Simple

Correct
That's it! Bind operations support three different mechanisms for authentication: (1) Anonymous, which doesn't actually authenticate at all, and allows anyone to query the server; (2) Simple, which involves sending the password in plaintext; and (3) SASL, or Simple Authentication and Security Layer, which involves a secure challenge-response authentication mechanism.

SASL

Correct
That's it! Bind operations support three different mechanisms for authentication: (1) Anonymous, which doesn't actually authenticate at all, and allows anyone to query the server; (2) Simple, which involves sending the password in plaintext; and (3) SASL, or Simple Authentication and Security Layer, which involves a secure challenge-response authentication mechanism.

5.

Question 5

Which of the following are services provided for the Directory Services?

Authorization

Correct
Directory services provide centralized authentication, authorization, and accounting, also known as AAA.

Centralized Authentication

Correct
Directory services provide centralized authentication, authorization, and accounting, also known as AAA.

Top comments (0)