ARCHITECTURE AND ENGINEERING FINAL
PAPER 2026 TEST PAPER QUESTIONS AND
SOLUTIONS GRADED A+
◉ Identity and Access Management Answer: A framework of policies
and technologies used to manage digital identities and control user
access to a resource within an organization
◉ Password Policy Answer: Rules set to enforce strong password
creation and management, including requirements for length, history,
complexity, and more.
◉ Privileged Access Management Answer: A security practice that
monitors and controls access to critical systems and data by users with
elevated access (e.g. admin accounts)
◉ Password Complexity Answer: A set of rules designed to make a
password stronger and more difficult to crack or guess.
◉ Kerberos Answer: A network authentication protocol that uses
symmetric key cryptography to securely authenticate users and services
over the network.
◉ Mandatory Access Control (MAC) Answer: A security model where
access to resources is determined by system-enforced policies. Access is
granted based on labels or classifications. (e.g. "Top Secret")
, ◉ Attribute-Based Access Control (ABAC) Answer: A security model
where access to resources is determined by attributes such as user role,
location, time of access, etc...
◉ In-band authentication Answer: A security method where
authentication occurs within the same communication channel used to
access the service or system. An example will include receiving a
verification token on the same device you are using to login.
◉ Out-of-Band authentication Answer: A security method where
authentication occurs using a separate communication channel from the
primary one. An example includes receiving a verification email with a
code to confirm your identity.
◉ Challenge Handshake Authentication Protocol (CHAP) Answer: A
secure authentication protocol used to verify the identity of a user or
device over the network by sending them a "challenge" (random value)
from the server to the client.
◉ JSON Web Token Answer: A compact, URL-safe token format used
for securely transmitting information between two parties as a JSON
object.
◉ Trusted Platform Module (TPM) Answer: a hardware based security
device used to store cryptographic keys, passwords, and other sensitive
data securely. This security device ensures that the system hardware and
software hasn't been tampered with.