exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 10 discussion

Actual exam question from CompTIA's CAS-004
Question #: 10
Topic #: 1
[All CAS-004 Questions]

An organization is implementing a new identity and access management architecture with the following objectives:
✑ Supporting MFA against on-premises infrastructure
✑ Improving the user experience by integrating with SaaS applications
✑ Applying risk-based policies based on location
✑ Performing just-in-time provisioning
Which of the following authentication protocols should the organization implement to support these requirements?

  • A. Kerberos and TACACS
  • B. SAML and RADIUS
  • C. OAuth and OpenID
  • D. OTP and 802.1X
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Pongpisit
Highly Voted 3 years, 3 months ago
Selected Answer: B
SAML and RADIUS
upvoted 20 times
AenAllAin
3 years, 2 months ago
I don't see how the answer could not be B... 1. The cited reference just points to an Azure AD manual. 2. JIT Provisioning uses SAML. 3. RADIUS is a true AAA; whereas, TACACS did not separate the AAA functionality until XTACACS and TACACS+. 4. Windows services tie you to Kerberos in their stack, but not all SaaS are Windows based. ...maybe I'm wrong
upvoted 8 times
...
...
AlexJacobson
Highly Voted 2 years, 9 months ago
Selected Answer: B
Definitely SAML and RADIUS (SAML because of just-in-time, and RADIUS because of AAA)
upvoted 8 times
...
Bright07
Most Recent 2 months, 2 weeks ago
Selected Answer: C
C is the right answer no doubt
upvoted 2 times
...
blacksheep6r
2 months, 2 weeks ago
Selected Answer: B
let's break down why B. SAML and RADIUS is the best choice: RADIUS: This protocol is commonly used to support MFA (multi-factor authentication) for on-premises systems. It helps in authenticating users at the network level, which is ideal for securing access to on-prem infrastructure. SAML: Security Assertion Markup Language (SAML) is widely adopted for federated identity management, making it a strong choice for integrating with SaaS applications. It also supports just-in-time (JIT) provisioning, where user accounts are created on the fly based on SAML assertions. Additionally, SAML-based systems can incorporate risk-based policies (like location-based controls) through the identity provider's configuration.
upvoted 1 times
...
Chiaretta
2 months, 3 weeks ago
Selected Answer: C
C is the right answer.
upvoted 3 times
...
Bright07
3 months, 4 weeks ago
Selected Answer: C
Ans is C. To meet the requirements for supporting MFA, integrating with SaaS applications, applying risk-based policies, and performing just-in-time provisioning, the best choice from the options provided would be: C. OAuth and OpenID OAuth: This protocol is commonly used for authorization in SaaS applications and allows for seamless integration with third-party services. It also supports just-in-time provisioning by allowing access tokens to be generated dynamically. OpenID: This protocol is used for authentication and can enhance user experience by providing a way to log in to multiple applications with a single identity. It also supports MFA, which is crucial for your requirements. Whereas SAML and RADIUS: SAML is good for federated authentication and works well with SaaS, but RADIUS is more focused on network access control and may not support all aspects of your requirements as comprehensively. So, OAuth and OpenID is the most suitable choice.
upvoted 3 times
...
Bright07
6 months ago
Ans is C. To meet the requirements for supporting MFA, integrating with SaaS applications, applying risk-based policies, and performing just-in-time provisioning, the best choice from the options provided would be: C. OAuth and OpenID OAuth: This protocol is commonly used for authorization in SaaS applications and allows for seamless integration with third-party services. It also supports just-in-time provisioning by allowing access tokens to be generated dynamically. OpenID: This protocol is used for authentication and can enhance user experience by providing a way to log in to multiple applications with a single identity. It also supports MFA, which is crucial for your requirements. Whereas SAML and RADIUS: SAML is good for federated authentication and works well with SaaS, but RADIUS is more focused on network access control and may not support all aspects of your requirements as comprehensively. So, OAuth and OpenID is the most suitable choice.
upvoted 3 times
...
IT_Master_Tech
6 months, 1 week ago
ChatGPT goes with C.
upvoted 3 times
...
salmonIsDecent
7 months ago
Selected Answer: C
C. OAuth and OpenID Reasoning: OAuth and OpenID Connect are widely used for SaaS integrations, JIT provisioning, MFA, and applying risk-based policies. This combination fits the organization's needs most comprehensively.
upvoted 3 times
...
surfuganda
7 months ago
Selected Answer: C
A. Kerberos and TACACS: [INCORRECT] Kerberos for on-premises auth within a domain but doesn't directly support integration with SaaS . TACACS doesn't support SaaS applications or risk-based policies based on location. B. SAML and RADIUS: [INCORRECT] SAML supports SSO, integrating with SaaS applications and applying risk-based policies based on location. RADIUS is used for NAC but doesn't directly support integration with SaaS applications. SAML aligns with the objectives, but RADIUS doesn't . C. OAuth and OpenID: [CORRECT] OAuth can grant access to resources, including SaaS applications, and can be used for MFA. OpenID provides SSO and user authentication, supports risk-based policies and just-in-time provisioning. D. OTP and 802.1X: [INCORRECT] OTP supports MFA, but is not ideal for integrating with SaaS applications or just-in-time provisioning. 802.1X is used for network access control and doesn't directly support the objectives.
upvoted 5 times
...
HereToStudy
8 months ago
Selected Answer: B
It’s B
upvoted 1 times
...
23169fd
9 months, 2 weeks ago
Selected Answer: B
OAuth and OpenID Connect are excellent for modern, web-based authentication scenarios, especially for integrating with SaaS applications and providing seamless SSO. However, OAuth and OpenID Connect do not inherently support MFA for on-premises infrastructure. They are more geared towards web and mobile applications and may require additional components to fully support MFA and risk-based policies for on-premises systems.
upvoted 6 times
...
Remmmie
1 year, 2 months ago
Selected Answer: C
Oauth and OpenID
upvoted 5 times
...
ElDirec
1 year, 2 months ago
Selected Answer: C
C. OAuth and OpenID OAuth (Open Authorization) and OpenID are modern, open-standard protocols that provide secure delegated access. They’re widely used for single sign-on (SSO) and identity federation. OAuth is a protocol that allows an application to authenticate against a server as a user, without requiring passwords or tokens to be passed to the application itself. This is particularly useful for SaaS applications. OpenID Connect (an extension of OAuth) is a protocol that allows clients to verify the identity of an end-user based on the authentication performed by an authorization server. Both OAuth and OpenID support just-in-time provisioning, which is the ability to create a user account within an application at the time of authentication2.
upvoted 4 times
...
Kabbath1986
1 year, 3 months ago
Selected Answer: C
C. OAuth and OpenID Explanation: OAuth (Open Authorization) is commonly used for authorization and delegated access. It is suitable for scenarios where a user wants to grant a third-party application limited access to their resources without sharing their credentials. OAuth is often used in conjunction with OpenID Connect (OIDC) for authentication. OpenID Connect (OIDC) is an identity layer built on top of OAuth 2.0. It provides an authentication layer, allowing clients to verify the identity of end-users based on the authentication performed by an authorization server.
upvoted 5 times
...
Kabbath1986
1 year, 3 months ago
Selected Answer: C
To support the specified objectives, the organization should implement the following authentication protocols: C. OAuth and OpenID Explanation: OAuth: OAuth is commonly used for delegated authorization and is suitable for integrating with SaaS applications. It allows secure access to resources without sharing the user's credentials. OpenID: OpenID is an authentication protocol that enables single sign-on (SSO) and is often used in conjunction with OAuth for user authentication. It is useful for improving the user experience by providing seamless access to multiple applications. This combination of OAuth and OpenID can help achieve multi-factor authentication (MFA), integrate with SaaS applications, and enhance the overall user experience.
upvoted 3 times
...
Delab202
1 year, 3 months ago
Selected Answer: C
The organization's objectives involve supporting multi-factor authentication (MFA), integrating with SaaS applications, applying risk-based policies, and performing just-in-time provisioning. The most suitable authentication protocols for these requirements are: C. OAuth and OpenID Explanation: OAuth (Open Authorization): OAuth is commonly used for authorization and enables secure API authorization flows, making it suitable for integrating with SaaS applications. It allows users to grant third-party applications limited access to their resources without sharing their credentials. OpenID: OpenID is an authentication protocol built on top of OAuth. It allows users to authenticate on one website and share their identity securely with other websites without the need to expose credentials. OpenID is beneficial for improving the user experience by enabling single sign-on (SSO) and supporting just-in-time provisioning.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago