IAM Quiz

IAM Quiz

Assessment

Quiz

Created by

Caitlin McGuire

Business

5th Grade

4 plays

Medium

Student preview

quiz-placeholder

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the policy-based centralized orchestration of user identity management and access control that helps support enterprise IT security and regulatory compliance while also allows organizations to not only define and enforce IAM policy, but also connect IAM functions

identity program management

Identity governance and administration (IGA) 

Access management

Privilege Access Management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's identity for login.

Identity Verification

Credential Management

Multifactor Authentication

Single Sign on

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the concept of allowing users to select and use a third-party digital identity, such as a social (Facebook, for example) or a higher-assurance identity (such as a bank or government ID) to access multiple digital services. 

Federated Identity

Decentralized Identity

Identity Proofing

BYOI (Bring your own Identity) 

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would an appropriate analyst cart be for this Inquiry:

What is Gartner recommending to end users to build an identity program infrastructure? • What concerns are you hearing from end users that do not have IGA governance tools? • What vendors are you seeing in this space?

David Collinson, Rebecca Archembault, Brian Guthrie, Nathan Harris

Mike Kelley, Henrique Teixeira, Abhyuday Data

Ant Allan, James Hoover

David Collinson, Mike Kelly, Felix Gahetgens

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would be an appropriate analyst cart for a Diagnostics results call for the IT Score for IAM?

Ant Allan, James Hoover David Collinson

Henrique Teixeira, Felix Gahetrgens, Mike Kelley

Rebecca Archembault, David, Collinson, Nathan Harris, Oscar Isaka 

A-     James Hoover, Sagar Patel, A. Data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

­­­­  ________­­­___  ensures that there is a real person behind a process and proves that they are who they claim to be.  This prevents anyone from carrying out a process on other people’s behalf without authorization, creating false identities, or committing fraud.

Machine Identity

Password Management

Credentialing

Identity Verification

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What would an appropriate analyst cart be for this Inquiry:

What are the most important things to plan for a long-term PAM program? What are the key components of PAM? It can be interpreted by different people in different ways - I'd like to know the common definition, and a typical approach implementing PAM over time.

Ant Allan, James Hoover, Michael Kelley

Michael Kelley, Felix Gaehetgens, James Hoover, Oscar Isaka

Nathan Harris, Brian Guthrie, Rebecca Archembault

Abhyuday Data, Ray Wagner

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?