
Chapter 8: Identity and Access Management

Quiz
•
Computers
•
University
•
Easy
Fhaa Lossx
Used 3+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Angela has chosen to federate with other organizations to allow use of services that each organization provides. What role does Angela's organization play when they authenticate their users and assert that those users are valid to other members of the federation?
Service provider
Relying party
Authentication provider
Identity provider
Answer explanation
Key Phrase: "authenticate their users"
Explanation:
Correct Answer (D): Angela's organization is acting as an Identity Provider (IdP) because it is authenticating users and asserting that they are valid to other federation members.
Why others are wrong:
A: Service provider provides services, but doesn't authenticate users.
B: Relying party trusts the IdP’s authentication assertions but doesn't authenticate itself.
C: Authentication provider is not a formal role in federated authentication.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following technologies is the least effective means of preventing shared accounts?
Password complexity requirements
Requiring biometric authentication
Requiring one-time passwords via a token
Requiring a one-time password via an application
Answer explanation
Key Phrase: "preventing shared accounts"
Explanation:
Correct Answer (A): Password complexity requirements do not prevent users from sharing complex passwords. Users may still share passwords that meet the complexity requirements.
Why others are wrong:
B: Biometric authentication requires physical presence and makes sharing more difficult.
C & D: One-time passwords (OTP via tokens or applications) are harder to share and much more effective than just requiring complex passwords.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment?
Account policy control will be set to the cloud provider's standards.
The cloud service will provide account and identity management services.
Multifactor authentication will not be supported by the cloud vendor.
None of the above.
Answer explanation
Key Phrase: "difference between on-premises and cloud-hosted identity services"
Explanation:
Correct Answer (B): In the cloud, the provider typically offers built-in account and identity management services, whereas on-premises services may require additional setup and maintenance.
Why others are wrong:
A: While cloud services might set account policies, that’s not the major difference.
C: Most cloud vendors support multifactor authentication, so this is not the distinguishing factor.
D: The difference is the level of management provided by the service, not "None of the above."
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Amitoj wants to ensure that her organization's password policy does not allow users to reset their password multiple times until they can reuse their current password. What setting is used to prevent this?
Complexity
Length
Expiration
Age
Answer explanation
Key Phrase: "prevent users from resetting their password multiple times"
Explanation:
Correct Answer (D): Password age is the setting that ensures users cannot reset their password too frequently and reuse the old one.
Why others are wrong:
A, B, C: Complexity, length, and expiration don’t affect the ability to reset and reuse passwords, they affect password creation and lifespan.
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which type of multifactor authentication is considered the least secure?
HOTP
SMS
TOTP
Biometric
Answer explanation
Key Phrase: "least secure multifactor authentication"
Explanation:
Correct Answer (B): SMS-based multifactor authentication is the least secure because it can be intercepted or hijacked through methods like SIM swapping.
Why others are wrong:
A: HOTP is more secure as it generates a unique code every time.
C: TOTP uses time-based codes which are also more secure than SMS.
D: Biometrics are generally more secure than SMS and harder to spoof.
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Geeta has been issued a USB security key as part of her organization's multifactor implementation. What type of implementation is this?
A hard token
A biometric token
A soft token
An attestation token
Answer explanation
Key Phrase: "USB security key"
Explanation:
Correct Answer (A): A USB security key is a hard token, a physical device that generates or stores authentication credentials.
Why others are wrong:
B: A biometric token would involve a physical trait like a fingerprint or facial scan, not a USB key.
C: A soft token is a digital token typically stored in an app or software.
D: An attestation token is used to verify the integrity of a device, not a user authentication method.
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Michelle enables the Windows picture password feature to control logins for her laptop. Which type of attribute will it provide?
Somewhere you are
Something you know
Something you are
Someone you know
Answer explanation
Key Phrase: "Windows picture password"
Explanation:
Correct Answer (B): A picture password is something the user knows — specific gestures (like taps or swipes) on a picture.
Why others are wrong:
A: Somewhere you are refers to location-based authentication.
C: Something you are refers to biometrics like fingerprints or face recognition.
D: Someone you know is not a factor used in authentication.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
202309 BMIT27x3 Revision Quiz 2

Quiz
•
University
20 questions
Computer Security Measures

Quiz
•
11th Grade - University
15 questions
Authentication and Access Control

Quiz
•
University
15 questions
CNET151 Chapt 11 Network & Vulnerability Scanning

Quiz
•
University
15 questions
Hacker

Quiz
•
University
20 questions
Quiz on Network and Internet Privacy and Security

Quiz
•
University
16 questions
Classroom Computer Rules

Quiz
•
6th Grade - University
15 questions
Post Test Modul 4 APSI

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University