WGU D488 Objective Assessment (Latest Update 2025 / 2026) Cybersecurity Architecture and Engineering | Questions and Answers | Grade A | 100% Correct (Verified Solutions)
Question:
single sign-on (SSO)
Answer:
Using one authentication credential to access multiple accounts or applications. In Windows this is provided by the Kerberos framework.
Question:
Remote Authentication Dial-In User Service (RADIUS)
Answer:
The RADIUS client is configured with the IP address of the RADIUS server and with a shared secret. Clients are switches and access points or VPN gateways and lot user laptops. This was developed in the time of dial up networking.
- / 4
Question:
Diameter
Answer:
Improves upon RADIUS by strengthening upon some of its weakness such as having a failover mechanism because it is TCP based while RADIUS doesn't since it is UDP based.
Question:
Terminal Access Controller Access-Control System Plus (TACACS+)
Answer:
CISCO developed this authentication protocol and is a reliable connection oriented using port 49 that encrypts all data in its packets.
Question:
Light Directory Access Protocol (LDAP)
Answer:
A directory services protocol that runs over TCP/IP networks. The LDAP schema is extensible, meaning it can added to or changed.
- / 4
Question:
Secure LDAP (LDAPS)
Answer:
A method of implementing LDAP using SSL/TLS encryption protocols to prevent eavesdropping and man-in-the-middle attacks
Question:
Kerberos Authentication
Answer:
An authentication protocol used in a Windows domain environment or on a Linux system; uses OS-generated keys, which makes this protocol more secure than having an administrator enter key. Two services make up this system the authentication service and the ticket granting service
Question:
Open Authorization (OAuth)
Answer:
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.
- / 4
Question:
Extensible Authentication Protocol (EAP)
Answer:
A framework for transporting authentication protocols that defines the format of the messages.
Question:
802.1x
Answer:
A port-based authentication protocol. Wireless can use 802.1X. For example, WPA2-Enterprise mode uses an 802.1X server (implemented as a RADIUS server) to add authentication.
Question:
Identity proofing
Answer:
The process of collecting and verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be and establishing a reliable relationship that can be trusted electronically between the individual and said credential for purposes of electronic authentication.
- / 4