Search Header Logo

IAM Quiz

Authored by Caitlin McGuire

Business

5th Grade

Used 4+ times

IAM Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the policy-based centralized orchestration of user identity management and access control that helps support enterprise IT security and regulatory compliance while also allows organizations to not only define and enforce IAM policy, but also connect IAM functions

identity program management

Identity governance and administration (IGA) 

Access management

Privilege Access Management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's identity for login.

Identity Verification

Credential Management

Multifactor Authentication

Single Sign on

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the concept of allowing users to select and use a third-party digital identity, such as a social (Facebook, for example) or a higher-assurance identity (such as a bank or government ID) to access multiple digital services. 

Federated Identity

Decentralized Identity

Identity Proofing

BYOI (Bring your own Identity) 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would an appropriate analyst cart be for this Inquiry:

What is Gartner recommending to end users to build an identity program infrastructure? • What concerns are you hearing from end users that do not have IGA governance tools? • What vendors are you seeing in this space?

David Collinson, Rebecca Archembault, Brian Guthrie, Nathan Harris

Mike Kelley, Henrique Teixeira, Abhyuday Data

Ant Allan, James Hoover

David Collinson, Mike Kelly, Felix Gahetgens

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would be an appropriate analyst cart for a Diagnostics results call for the IT Score for IAM?

Ant Allan, James Hoover David Collinson

Henrique Teixeira, Felix Gahetrgens, Mike Kelley

Rebecca Archembault, David, Collinson, Nathan Harris, Oscar Isaka 

A-     James Hoover, Sagar Patel, A. Data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

­­­­  ________­­­___  ensures that there is a real person behind a process and proves that they are who they claim to be.  This prevents anyone from carrying out a process on other people’s behalf without authorization, creating false identities, or committing fraud.

Machine Identity

Password Management

Credentialing

Identity Verification

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would an appropriate analyst cart be for this Inquiry:

What are the most important things to plan for a long-term PAM program? What are the key components of PAM? It can be interpreted by different people in different ways - I'd like to know the common definition, and a typical approach implementing PAM over time.

Ant Allan, James Hoover, Michael Kelley

Michael Kelley, Felix Gaehetgens, James Hoover, Oscar Isaka

Nathan Harris, Brian Guthrie, Rebecca Archembault

Abhyuday Data, Ray Wagner

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?