Search Header Logo

4) Identity and Access Management

Authored by Hazem Saleh

Computers

Professional Development

Used 2+ times

4) Identity and Access Management
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Angela has chosen to federate with other organizations to allow use of services that each organization provides. What role does Angela's organization play when they authenticate their users and assert that those users are valid to other members of the federation?

Service provider

Relying party

Authentication provider

Identity provider

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following technologies is the least effective means of preventing shared accounts?

Password complexity requirements

Requiring biometric authentication

Requiring one-time passwords via a token

Requiring a one-time password via an application

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment?

Account policy control will be set to the cloud provider's standards.

The cloud service will provide account and identity management services.

Multi Factor authentication will not be supported by the cloud vendor.

None of the above.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Amitoj wants to ensure that her organization's password policy does not allow users to reset their password multiple times until they can reuse their current password. What setting is used to prevent this?

Complexity

Length

Expiration

Age

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of multifactor authentication is considered the least secure?

HOTP

SMS

TOTP

Biometric

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

SMS messages are not secure and could be accessed by cloning a SIM card or redirecting VoIP traffic. Which of the following is generally considered more secure than an SMS-based factor?

HOTP and TOTP tokens

SMS-based factor

Email verification

Passwords

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Geeta has been issued a USB security key as part of her organization's multifactor implementation. What type of implementation is this?

A hard token

A biometric token

A soft token

An attestation token

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?