Identity and Access Management Quiz

Identity and Access Management Quiz

University

18 Qs

quiz-placeholder

Similar activities

cybersecurity quiz

cybersecurity quiz

University

20 Qs

ICT POLICIES AND ISSUES: IMPLICATIONS TO TEACHING (DELA CRUZ)

ICT POLICIES AND ISSUES: IMPLICATIONS TO TEACHING (DELA CRUZ)

University

16 Qs

Windows Server Installation with DHCP, DNS, and AD

Windows Server Installation with DHCP, DNS, and AD

University

18 Qs

Windows File Sharing Quiz

Windows File Sharing Quiz

University

19 Qs

InfoSec Quiz 1

InfoSec Quiz 1

University

15 Qs

TOPIC 4.0  Information Security Governance Principles

TOPIC 4.0 Information Security Governance Principles

University

20 Qs

Service-Oriented Architecture Quiz

Service-Oriented Architecture Quiz

University

17 Qs

Quiz Mobile Devices and Internet of Things

Quiz Mobile Devices and Internet of Things

University

20 Qs

Identity and Access Management Quiz

Identity and Access Management Quiz

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

z mf

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Identity and Access Management (IAM)?

A framework of policies and technology that authenticates and authorizes access to applications, data, systems, and cloud platforms.

A method to manually assign user privileges.

A type of software used for data storage.

A security measure for physical access control.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Privileged Access Management (PAM) focus on?

Protecting privileged accounts.

Managing user identities.

Automating access control.

Tracking user activities.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the benefits of IAM technologies?

Greater control of user access.

Increased manual processes.

Higher risk of data breaches.

Reduced efficiency in operations.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Mandatory Access Control (MAC)?

A model that compares object's security designation with subject's clearance level.

A model that allows owners to control access through ACLs.

A model based on predefined roles.

A model that restricts access based on operational rules.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a biometric device?

Fingerprint scanner.

Smart card.

Card reader.

Access Control List.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Certificate-Based Authentication use?

Digital certificates to prove identity.

Usernames and passwords.

Biometric data.

Physical tokens.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Directory Services?

To centralize security for controlling access to network resources.

To manage physical access control devices.

To automate user identity management.

To provide a framework for IAM.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?