Chapter 8: Identity and Access Management

Chapter 8: Identity and Access Management

University

20 Qs

quiz-placeholder

Similar activities

Chapter 5.1

Chapter 5.1

University

20 Qs

CNET151 Chapt 11 Network & Vulnerability Scanning

CNET151 Chapt 11 Network & Vulnerability Scanning

University

15 Qs

Hacker

Hacker

University

15 Qs

Quiz on Network and Internet Privacy and Security

Quiz on Network and Internet Privacy and Security

University

20 Qs

Classroom Computer Rules

Classroom Computer Rules

6th Grade - University

16 Qs

Post Test Modul 4 APSI

Post Test Modul 4 APSI

University

15 Qs

CRYPT-IN (prelims)

CRYPT-IN (prelims)

University

20 Qs

Quiz_Pertemuan1_IRS

Quiz_Pertemuan1_IRS

University

15 Qs

Chapter 8: Identity and Access Management

Chapter 8: Identity and Access Management

Assessment

Quiz

Computers

University

Easy

Created by

Fhaa Lossx

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Angela has chosen to federate with other organizations to allow use of services that each organization provides. What role does Angela's organization play when they authenticate their users and assert that those users are valid to other members of the federation?

Service provider

Relying party

Authentication provider

Identity provider

Answer explanation

Key Phrase: "authenticate their users"

Explanation:
Correct Answer (D): Angela's organization is acting as an Identity Provider (IdP) because it is authenticating users and asserting that they are valid to other federation members.
Why others are wrong:

  • A: Service provider provides services, but doesn't authenticate users.

  • B: Relying party trusts the IdP’s authentication assertions but doesn't authenticate itself.

  • C: Authentication provider is not a formal role in federated authentication.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following technologies is the least effective means of preventing shared accounts?

Password complexity requirements

Requiring biometric authentication

Requiring one-time passwords via a token

Requiring a one-time password via an application

Answer explanation

Key Phrase: "preventing shared accounts"

Explanation:
Correct Answer (A): Password complexity requirements do not prevent users from sharing complex passwords. Users may still share passwords that meet the complexity requirements.
Why others are wrong:

  • B: Biometric authentication requires physical presence and makes sharing more difficult.

  • C & D: One-time passwords (OTP via tokens or applications) are harder to share and much more effective than just requiring complex passwords.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment?

Account policy control will be set to the cloud provider's standards.

The cloud service will provide account and identity management services.

Multifactor authentication will not be supported by the cloud vendor.

None of the above.

Answer explanation

Key Phrase: "difference between on-premises and cloud-hosted identity services"

Explanation:
Correct Answer (B): In the cloud, the provider typically offers built-in account and identity management services, whereas on-premises services may require additional setup and maintenance.
Why others are wrong:

  • A: While cloud services might set account policies, that’s not the major difference.

  • C: Most cloud vendors support multifactor authentication, so this is not the distinguishing factor.

D: The difference is the level of management provided by the service, not "None of the above."

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Amitoj wants to ensure that her organization's password policy does not allow users to reset their password multiple times until they can reuse their current password. What setting is used to prevent this?

Complexity

Length

Expiration

Age

Answer explanation

Key Phrase: "prevent users from resetting their password multiple times"

Explanation:
Correct Answer (D): Password age is the setting that ensures users cannot reset their password too frequently and reuse the old one.
Why others are wrong:

  • A, B, C: Complexity, length, and expiration don’t affect the ability to reset and reuse passwords, they affect password creation and lifespan.

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which type of multifactor authentication is considered the least secure?

HOTP

SMS

TOTP

Biometric

Answer explanation

Key Phrase: "least secure multifactor authentication"

Explanation:
Correct Answer (B): SMS-based multifactor authentication is the least secure because it can be intercepted or hijacked through methods like SIM swapping.
Why others are wrong:

  • A: HOTP is more secure as it generates a unique code every time.

  • C: TOTP uses time-based codes which are also more secure than SMS.

  • D: Biometrics are generally more secure than SMS and harder to spoof.

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Geeta has been issued a USB security key as part of her organization's multifactor implementation. What type of implementation is this?

A hard token

A biometric token

A soft token

An attestation token

Answer explanation

Key Phrase: "USB security key"

Explanation:
Correct Answer (A): A USB security key is a hard token, a physical device that generates or stores authentication credentials.
Why others are wrong:

  • B: A biometric token would involve a physical trait like a fingerprint or facial scan, not a USB key.

  • C: A soft token is a digital token typically stored in an app or software.

  • D: An attestation token is used to verify the integrity of a device, not a user authentication method.

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Michelle enables the Windows picture password feature to control logins for her laptop. Which type of attribute will it provide?

Somewhere you are

Something you know

Something you are

Someone you know

Answer explanation

Key Phrase: "Windows picture password"

Explanation:
Correct Answer (B): A picture password is something the user knows — specific gestures (like taps or swipes) on a picture.
Why others are wrong:

  • A: Somewhere you are refers to location-based authentication.

  • C: Something you are refers to biometrics like fingerprints or face recognition.

  • D: Someone you know is not a factor used in authentication.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?