This chapter includes questions from the following objectives:
• 1.1 Implement and maintain authentication methods
• 1.2 Support internetwork trust architectures
• 1.3 Participate in the identity management lifecycle
• 1.4 Implement access controls
This chapter contains a complete set of questions and answers regarding various methods and best practices that can be used to implement user and device authentication (single/dual/multifactor authentication, SSO, federated access, centralized/decentralized authentication); different trust models (one-way, two-way, transitive trust); and network types (internet, intranet, and extranet) that can be utilized. Additionally, it contains questions regarding the identity ...