Search Header Logo

IAM and PAM Features

Authored by Naveen Yadav

Computers

Professional Development

Used 1+ times

IAM and PAM Features
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company needs to restrict access to confidential HR files only to HR managers. Which IAM feature should they use?

Single Sign-On

Role-Based Access Control (RBAC)

Multi-Factor Authentication

Least Privilege

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user leaves an organization, but their access to cloud resources remains active. What IAM feature could prevent this?

Automated Deprovisioning

Password Rotation

Privileged Session Management

Access Control Lists

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security team wants to monitor and record administrative activities performed on critical servers. Which PAM feature helps?

Just-in-Time Access

Privileged Session Monitoring

Single Sign-On

Role-Based Access Control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user complains that they lost access to an application they used last week. What IAM process should be checked?

User Provisioning

Access Recertification

Identity Federation

Multi-Factor Authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is implementing least privilege access for IT admins. What should they configure?

Grant admin rights to all employees

Limit admin rights to necessary tasks

Allow all users to change system settings

Remove all admin privileges

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security audit reveals that passwords for privileged accounts haven’t changed in a year. What PAM feature should be enforced?

Password Vaulting

Privileged Access Rotation

Access Logging

Just-in-Time Access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization wants to allow employees to use their corporate credentials to access a third-party SaaS application. What should they implement?

OAuth 2.0

Single Sign-On (SSO)

Multi-Factor Authentication

Just-in-Time Access

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?