Identity and Access Management Quiz

Identity and Access Management Quiz

University

18 Qs

quiz-placeholder

Similar activities

TOPIC 4.0  Information Security Governance Principles

TOPIC 4.0 Information Security Governance Principles

University

20 Qs

Quiz Mobile Devices and Internet of Things

Quiz Mobile Devices and Internet of Things

University

20 Qs

Domain 4 - Network Security

Domain 4 - Network Security

10th Grade - University

16 Qs

Network Security Quiz

Network Security Quiz

University

20 Qs

Konfigurasi Dasar MikroTik

Konfigurasi Dasar MikroTik

12th Grade - University

20 Qs

NISS-DC-Quiz

NISS-DC-Quiz

University

15 Qs

Understanding Linux File Permissions

Understanding Linux File Permissions

10th Grade - University

20 Qs

Quiz 1 | Information Security | Kali Linux Commands

Quiz 1 | Information Security | Kali Linux Commands

University

20 Qs

Identity and Access Management Quiz

Identity and Access Management Quiz

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

z mf

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Identity and Access Management (IAM)?

A framework of policies and technology that authenticates and authorizes access to applications, data, systems, and cloud platforms.

A method to manually assign user privileges.

A type of software used for data storage.

A security measure for physical access control.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Privileged Access Management (PAM) focus on?

Protecting privileged accounts.

Managing user identities.

Automating access control.

Tracking user activities.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the benefits of IAM technologies?

Greater control of user access.

Increased manual processes.

Higher risk of data breaches.

Reduced efficiency in operations.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Mandatory Access Control (MAC)?

A model that compares object's security designation with subject's clearance level.

A model that allows owners to control access through ACLs.

A model based on predefined roles.

A model that restricts access based on operational rules.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a biometric device?

Fingerprint scanner.

Smart card.

Card reader.

Access Control List.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Certificate-Based Authentication use?

Digital certificates to prove identity.

Usernames and passwords.

Biometric data.

Physical tokens.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Directory Services?

To centralize security for controlling access to network resources.

To manage physical access control devices.

To automate user identity management.

To provide a framework for IAM.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?