
Identity and Access Management
Authored by Alan Shepard
Professional Development
Professional Development
Used 105+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Your organization is planning to implement remote access capabilities. Management wants strong authentication and wants to ensure passwords expire after a predefined time interval. Which of the following best meets this need?
HOTP
TOTP
CAC
Kerberos
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Your organization has decided to implement a biometric solution for authentication. One of the goals is to ensure that the system is highly accurate. Which of the following provides the BEST indication of accuracy with the biometric system?
The lowest possible FRR
The highest possible FAR
The lowest possible CER
The highest possible CER
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Employees enter a username and password into the company application from their smartphone and the application logs their location using GPS. Which type of authentication is being used?
One-factor
Dual-factor
Something you are
Somewhere you are
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A network includes a ticket-granting ticket server used for authentication. Which authentication service does this network use?
Shibboleth
SAML
LDAP
Kerberos
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Lisa is a training instructor and she maintains a training lab with 18 computers. She has enough rights and permission so that she can configure them as needed for classes. However, she does not have the rights to add them to the organizations domain. What is being shown in this example?
Least privilege
Need to know
Group-based privileges
Location-based policies
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Marge is reviewing an organizations account management processes. She wants to ensure that security log entries accurately report the identity of personnel taking specific actions. Which step would best meet this requirement?
Update ACLs for all files and folders
Implement role-based privileges
Use an SSO solution
Remove all Shared accounts
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
A recent security audit discovered several apparently dormant user accounts. Although users could log on to the accounts, no one had logged on to them for more than 60 days. You later discovered that these accounts are for contractors who work approximately one week every quarter. Which of the following is the BEST response to this situation?
Remove the account expiration from the accounts.
Delete the accoutns.
Reset the accounts.
Disable the accounts.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
ESL Vocabulary: Technology 1
Quiz
•
University - Professi...
10 questions
INTO Artificial Intelligence
Quiz
•
University - Professi...
11 questions
Term 1 Reflection
Quiz
•
KG - Professional Dev...
18 questions
Customer Relations Day 6
Quiz
•
Professional Development
12 questions
Communication and Sales by Vishal Jaiswal
Quiz
•
KG - Professional Dev...
15 questions
SQL Statements and Queries
Quiz
•
Professional Development
10 questions
Prof Ed 6
Quiz
•
Professional Development
15 questions
Google Ads Fundamentals
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade