
4) Identity and Access Management
Authored by Hazem Saleh
Computers
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Angela has chosen to federate with other organizations to allow use of services that each organization provides. What role does Angela's organization play when they authenticate their users and assert that those users are valid to other members of the federation?
Service provider
Relying party
Authentication provider
Identity provider
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following technologies is the least effective means of preventing shared accounts?
Password complexity requirements
Requiring biometric authentication
Requiring one-time passwords via a token
Requiring a one-time password via an application
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment?
Account policy control will be set to the cloud provider's standards.
The cloud service will provide account and identity management services.
Multi Factor authentication will not be supported by the cloud vendor.
None of the above.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Amitoj wants to ensure that her organization's password policy does not allow users to reset their password multiple times until they can reuse their current password. What setting is used to prevent this?
Complexity
Length
Expiration
Age
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which type of multifactor authentication is considered the least secure?
HOTP
SMS
TOTP
Biometric
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
SMS messages are not secure and could be accessed by cloning a SIM card or redirecting VoIP traffic. Which of the following is generally considered more secure than an SMS-based factor?
HOTP and TOTP tokens
SMS-based factor
Email verification
Passwords
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Geeta has been issued a USB security key as part of her organization's multifactor implementation. What type of implementation is this?
A hard token
A biometric token
A soft token
An attestation token
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?