IAS 2 Identity and Access Management Q5

IAS 2 Identity and Access Management Q5

University

25 Qs

quiz-placeholder

Similar activities

Network Security

Network Security

University

20 Qs

Week 12 - Module 5 Unit 3 Using Access Control

Week 12 - Module 5 Unit 3 Using Access Control

University

20 Qs

Introduction to Database

Introduction to Database

University

20 Qs

035_Cloud-specific Vulnerabilities – CompTIA Security+ –

035_Cloud-specific Vulnerabilities – CompTIA Security+ –

9th Grade - University

20 Qs

AACS3013 Quick Revision C1-C3

AACS3013 Quick Revision C1-C3

University

20 Qs

Operating System Security Quiz

Operating System Security Quiz

University

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

COA

COA

University

20 Qs

IAS 2 Identity and Access Management Q5

IAS 2 Identity and Access Management Q5

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Multi-Factor Authentication (MFA)?

  • A. To use multiple passwords for a single account

  • B. To require multiple forms of verification to increase security

  • C. To allow access from multiple devices

  • D. To manage multiple user accounts

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of least privilege?

  • A. Users have the maximum level of access

  • B. Users have no access rights

  • C. Users have the minimal level of access necessary to perform their job functions

  • D. Users have temporary access rights

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes Role-Based Access Control (RBAC)?

  • A. Access is based on the user's role within an organization

  • B. Access is determined by the user's location

  • C. Access is based on the user's hardware

  • D. Access is randomly assigned

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common use of a directory service in IAM?

  • A. To store and manage user identities and access privileges

  • B. To encrypt user data

  • C. To monitor network traffic

  • D. To backup data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'authentication' refer to in IAM?

  • A. The process of monitoring user activities

  • B. The process of verifying the identity of a user

  • C. The process of encrypting data

  • D. The process of backing up data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes 'authorization'?

  • A. The process of verifying user identity

  • B. The process of granting or denying access to resources

  • C. The process of encrypting user data

  • D. The process of monitoring network traffic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Identity Provider (IdP) in federated identity management?

  • A. A service that authenticates and verifies user identities

  • B. A service that stores encrypted data

  • C. A service that monitors network traffic

  • D. A service that performs backups

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?