Identity and Access Management

Identity and Access Management

Professional Development

13 Qs

quiz-placeholder

Similar activities

MOOE WEB BASED MONITORING SYSTEM

MOOE WEB BASED MONITORING SYSTEM

Professional Development

10 Qs

Business Accounts

Business Accounts

Professional Development

10 Qs

Prepositions

Prepositions

Professional Development

10 Qs

SOE

SOE

Professional Development

10 Qs

Unity 101 | Refresher

Unity 101 | Refresher

Professional Development

15 Qs

New Teacher Orientation 2018

New Teacher Orientation 2018

Professional Development

17 Qs

529 - November Knowledge Check

529 - November Knowledge Check

Professional Development

16 Qs

Identity and Access Management

Identity and Access Management

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Alan Shepard

Used 105+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Your organization is planning to implement remote access capabilities. Management wants strong authentication and wants to ensure passwords expire after a predefined time interval. Which of the following best meets this need?

HOTP

TOTP

CAC

Kerberos

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Your organization has decided to implement a biometric solution for authentication. One of the goals is to ensure that the system is highly accurate. Which of the following provides the BEST indication of accuracy with the biometric system?

The lowest possible FRR

The highest possible FAR

The lowest possible CER

The highest possible CER

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Employees enter a username and password into the company application from their smartphone and the application logs their location using GPS. Which type of authentication is being used?

One-factor

Dual-factor

Something you are

Somewhere you are

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A network includes a ticket-granting ticket server used for authentication. Which authentication service does this network use?

Shibboleth

SAML

LDAP

Kerberos

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Lisa is a training instructor and she maintains a training lab with 18 computers. She has enough rights and permission so that she can configure them as needed for classes. However, she does not have the rights to add them to the organizations domain. What is being shown in this example?

Least privilege

Need to know

Group-based privileges

Location-based policies

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Marge is reviewing an organizations account management processes. She wants to ensure that security log entries accurately report the identity of personnel taking specific actions. Which step would best meet this requirement?

Update ACLs for all files and folders

Implement role-based privileges

Use an SSO solution

Remove all Shared accounts

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A recent security audit discovered several apparently dormant user accounts. Although users could log on to the accounts, no one had logged on to them for more than 60 days. You later discovered that these accounts are for contractors who work approximately one week every quarter. Which of the following is the BEST response to this situation?

Remove the account expiration from the accounts.

Delete the accoutns.

Reset the accounts.

Disable the accounts.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?