
Chapter 8: Identity and Access Management
Authored by Fhaa Lossx
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Angela has chosen to federate with other organizations to allow use of services that each organization provides. What role does Angela's organization play when they authenticate their users and assert that those users are valid to other members of the federation?
Service provider
Relying party
Authentication provider
Identity provider
Answer explanation
Key Phrase: "authenticate their users"
Explanation:
Correct Answer (D): Angela's organization is acting as an Identity Provider (IdP) because it is authenticating users and asserting that they are valid to other federation members.
Why others are wrong:
A: Service provider provides services, but doesn't authenticate users.
B: Relying party trusts the IdP’s authentication assertions but doesn't authenticate itself.
C: Authentication provider is not a formal role in federated authentication.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following technologies is the least effective means of preventing shared accounts?
Password complexity requirements
Requiring biometric authentication
Requiring one-time passwords via a token
Requiring a one-time password via an application
Answer explanation
Key Phrase: "preventing shared accounts"
Explanation:
Correct Answer (A): Password complexity requirements do not prevent users from sharing complex passwords. Users may still share passwords that meet the complexity requirements.
Why others are wrong:
B: Biometric authentication requires physical presence and makes sharing more difficult.
C & D: One-time passwords (OTP via tokens or applications) are harder to share and much more effective than just requiring complex passwords.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment?
Account policy control will be set to the cloud provider's standards.
The cloud service will provide account and identity management services.
Multifactor authentication will not be supported by the cloud vendor.
None of the above.
Answer explanation
Key Phrase: "difference between on-premises and cloud-hosted identity services"
Explanation:
Correct Answer (B): In the cloud, the provider typically offers built-in account and identity management services, whereas on-premises services may require additional setup and maintenance.
Why others are wrong:
A: While cloud services might set account policies, that’s not the major difference.
C: Most cloud vendors support multifactor authentication, so this is not the distinguishing factor.
D: The difference is the level of management provided by the service, not "None of the above."
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Amitoj wants to ensure that her organization's password policy does not allow users to reset their password multiple times until they can reuse their current password. What setting is used to prevent this?
Complexity
Length
Expiration
Age
Answer explanation
Key Phrase: "prevent users from resetting their password multiple times"
Explanation:
Correct Answer (D): Password age is the setting that ensures users cannot reset their password too frequently and reuse the old one.
Why others are wrong:
A, B, C: Complexity, length, and expiration don’t affect the ability to reset and reuse passwords, they affect password creation and lifespan.
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which type of multifactor authentication is considered the least secure?
HOTP
SMS
TOTP
Biometric
Answer explanation
Key Phrase: "least secure multifactor authentication"
Explanation:
Correct Answer (B): SMS-based multifactor authentication is the least secure because it can be intercepted or hijacked through methods like SIM swapping.
Why others are wrong:
A: HOTP is more secure as it generates a unique code every time.
C: TOTP uses time-based codes which are also more secure than SMS.
D: Biometrics are generally more secure than SMS and harder to spoof.
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Geeta has been issued a USB security key as part of her organization's multifactor implementation. What type of implementation is this?
A hard token
A biometric token
A soft token
An attestation token
Answer explanation
Key Phrase: "USB security key"
Explanation:
Correct Answer (A): A USB security key is a hard token, a physical device that generates or stores authentication credentials.
Why others are wrong:
B: A biometric token would involve a physical trait like a fingerprint or facial scan, not a USB key.
C: A soft token is a digital token typically stored in an app or software.
D: An attestation token is used to verify the integrity of a device, not a user authentication method.
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Michelle enables the Windows picture password feature to control logins for her laptop. Which type of attribute will it provide?
Somewhere you are
Something you know
Something you are
Someone you know
Answer explanation
Key Phrase: "Windows picture password"
Explanation:
Correct Answer (B): A picture password is something the user knows — specific gestures (like taps or swipes) on a picture.
Why others are wrong:
A: Somewhere you are refers to location-based authentication.
C: Something you are refers to biometrics like fingerprints or face recognition.
D: Someone you know is not a factor used in authentication.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Assessment 08
Quiz
•
University
15 questions
Monday Week#2
Quiz
•
University
15 questions
Human Computer Interaction (HCI)
Quiz
•
University
20 questions
Infrastructure (Network)
Quiz
•
University
20 questions
C Quest 2.0
Quiz
•
University
15 questions
IT 209
Quiz
•
University
20 questions
PHP First Internal Practical Viva
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
5 questions
Examining Theme
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University