IAM Quiz 5

IAM Quiz 5

Professional Development

10 Qs

quiz-placeholder

Similar activities

F5 Sejarah Output Test 28/7/2020

F5 Sejarah Output Test 28/7/2020

1st Grade - Professional Development

6 Qs

OneWeb

OneWeb

KG - Professional Development

11 Qs

Army History (MAPPEN) 5B HWHPS3400

Army History (MAPPEN) 5B HWHPS3400

5th Grade - Professional Development

14 Qs

IAM Quiz 1

IAM Quiz 1

Professional Development

10 Qs

F3 SEJARAH OUTPUT TEST 24/04/2020

F3 SEJARAH OUTPUT TEST 24/04/2020

1st Grade - Professional Development

10 Qs

Innovation and Disruptive Technology Quiz

Innovation and Disruptive Technology Quiz

Professional Development

10 Qs

A Level Core Notes 6 Part 2 Quiz

A Level Core Notes 6 Part 2 Quiz

University - Professional Development

7 Qs

ILTS 5

ILTS 5

Professional Development

7 Qs

IAM Quiz 5

IAM Quiz 5

Assessment

Quiz

History

Professional Development

Practice Problem

Medium

Created by

Rahul Jadhav

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of access reviews?

To create new user accounts

To ensure users have appropriate access to resources

To delete inactive accounts

To change user passwords

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of a breach of IAM policy?

Using a strong password

Sharing login credentials with a colleague

Enabling MFA

Regularly updating access permissions

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is a common framework for managing IAM?

ITIL

NIST Cybersecurity Framework

Agile

SCRUM

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is 'contextual access management'?

Access control based solely on user identity

Access control that considers user context, such as location and device

A process for creating user accounts

A method for deleting inactive accounts

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of a social engineering attack?

Phishing

SQL Injection

Cross-Site Scripting (XSS)

Distributed Denial of Service (DDoS)

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary purpose of an identity management policy?

To limit internet access

To define how identities and access are managed within an organization

To create new software

To monitor network performance

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which IAM model allows users to access multiple applications with one set of credentials?

Basic authentication

Single Sign-On (SSO)

Multi-Factor Authentication (MFA)

Password-less authentication

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?