
Chapter 8: Identity and Access Management
Quiz
•
Computers
•
University
•
Easy
Fhaa Lossx
Used 3+ times
FREE Resource
Enhance your content
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Angela has chosen to federate with other organizations to allow use of services that each organization provides. What role does Angela's organization play when they authenticate their users and assert that those users are valid to other members of the federation?
Service provider
Relying party
Authentication provider
Identity provider
Answer explanation
Key Phrase: "authenticate their users"
Explanation:
Correct Answer (D): Angela's organization is acting as an Identity Provider (IdP) because it is authenticating users and asserting that they are valid to other federation members.
Why others are wrong:
A: Service provider provides services, but doesn't authenticate users.
B: Relying party trusts the IdP’s authentication assertions but doesn't authenticate itself.
C: Authentication provider is not a formal role in federated authentication.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following technologies is the least effective means of preventing shared accounts?
Password complexity requirements
Requiring biometric authentication
Requiring one-time passwords via a token
Requiring a one-time password via an application
Answer explanation
Key Phrase: "preventing shared accounts"
Explanation:
Correct Answer (A): Password complexity requirements do not prevent users from sharing complex passwords. Users may still share passwords that meet the complexity requirements.
Why others are wrong:
B: Biometric authentication requires physical presence and makes sharing more difficult.
C & D: One-time passwords (OTP via tokens or applications) are harder to share and much more effective than just requiring complex passwords.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment?
Account policy control will be set to the cloud provider's standards.
The cloud service will provide account and identity management services.
Multifactor authentication will not be supported by the cloud vendor.
None of the above.
Answer explanation
Key Phrase: "difference between on-premises and cloud-hosted identity services"
Explanation:
Correct Answer (B): In the cloud, the provider typically offers built-in account and identity management services, whereas on-premises services may require additional setup and maintenance.
Why others are wrong:
A: While cloud services might set account policies, that’s not the major difference.
C: Most cloud vendors support multifactor authentication, so this is not the distinguishing factor.
D: The difference is the level of management provided by the service, not "None of the above."
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Amitoj wants to ensure that her organization's password policy does not allow users to reset their password multiple times until they can reuse their current password. What setting is used to prevent this?
Complexity
Length
Expiration
Age
Answer explanation
Key Phrase: "prevent users from resetting their password multiple times"
Explanation:
Correct Answer (D): Password age is the setting that ensures users cannot reset their password too frequently and reuse the old one.
Why others are wrong:
A, B, C: Complexity, length, and expiration don’t affect the ability to reset and reuse passwords, they affect password creation and lifespan.
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which type of multifactor authentication is considered the least secure?
HOTP
SMS
TOTP
Biometric
Answer explanation
Key Phrase: "least secure multifactor authentication"
Explanation:
Correct Answer (B): SMS-based multifactor authentication is the least secure because it can be intercepted or hijacked through methods like SIM swapping.
Why others are wrong:
A: HOTP is more secure as it generates a unique code every time.
C: TOTP uses time-based codes which are also more secure than SMS.
D: Biometrics are generally more secure than SMS and harder to spoof.
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Geeta has been issued a USB security key as part of her organization's multifactor implementation. What type of implementation is this?
A hard token
A biometric token
A soft token
An attestation token
Answer explanation
Key Phrase: "USB security key"
Explanation:
Correct Answer (A): A USB security key is a hard token, a physical device that generates or stores authentication credentials.
Why others are wrong:
B: A biometric token would involve a physical trait like a fingerprint or facial scan, not a USB key.
C: A soft token is a digital token typically stored in an app or software.
D: An attestation token is used to verify the integrity of a device, not a user authentication method.
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Michelle enables the Windows picture password feature to control logins for her laptop. Which type of attribute will it provide?
Somewhere you are
Something you know
Something you are
Someone you know
Answer explanation
Key Phrase: "Windows picture password"
Explanation:
Correct Answer (B): A picture password is something the user knows — specific gestures (like taps or swipes) on a picture.
Why others are wrong:
A: Somewhere you are refers to location-based authentication.
C: Something you are refers to biometrics like fingerprints or face recognition.
D: Someone you know is not a factor used in authentication.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
16 questions
Algo Quiz
Quiz
•
University
20 questions
DI (EM24) - Diseño de Contenidos (T8)
Quiz
•
University - Professi...
20 questions
The Internet
Quiz
•
University
20 questions
IT 101 - Quiz 3
Quiz
•
University
20 questions
Sesion 1 Curso LPIC 2023
Quiz
•
University
20 questions
KAMALUDDEEN IBRAHIM YARIMA
Quiz
•
University
15 questions
Chapter 4 - Social Engineering
Quiz
•
University
21 questions
CPA MS-Office Hotkeys Quiz
Quiz
•
8th Grade - Professio...
Popular Resources on Wayground
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
20 questions
MINERS Core Values Quiz
Quiz
•
8th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
10 questions
How to Email your Teacher
Quiz
•
Professional Development
15 questions
Order of Operations
Quiz
•
5th Grade
Discover more resources for Computers
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
7 questions
Central Idea of Informational Text
Interactive video
•
4th Grade - University
20 questions
Physical or Chemical Change/Phases
Quiz
•
8th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
39 questions
Unit 7 Key Terms
Quiz
•
11th Grade - University
7 questions
Transition Words and Phrases
Interactive video
•
4th Grade - University
18 questions
Plotting Points on the Coordinate Plane
Quiz
•
KG - University
5 questions
Declaration of Independence
Interactive video
•
4th Grade - University