
IAM Quiz 2
Authored by Rahul Jadhav
History
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is a common identity verification method?
Voice recognition
Social engineering
VPN connection
Data encryption
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What does MFA stand for?
Multi-Factor Authentication
Multiple-Factor Access
Multi-Factor Access
Managed Factor Authentication
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following best describes "least privilege"?
Users should have the most access possible
Users should have access only to the resources they need
All users should have equal access
Users should not have any access
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of these protocols is used for federated identity?
FTP
SAML
HTTP
DNS
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the purpose of a user provisioning system?
To manage hardware resources
To automate the creation and management of user accounts
To track network traffic
To enforce network security policies
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is an access control list (ACL)?
A list of users who can access a specific resource
A list of denied users
A log of access attempts
A list of system errors
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is an example of identity federation?
Using the same password for multiple accounts
Logging into different services using a Google account
Creating a new account for each service
Using a VPN
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?