Identity and Access Management PASSED Actual Exam Questions and CORRECT Answers
1 view 0 purchase
Course
Identity and Access Management
Institution
Identity And Access Management
Identity and Access Management PASSED
Actual Exam Questions and CORRECT
Answers
The first stage is identification is where a username or smart card is used, followed by
authentication where a password or pin is inserted and then the authorization stage where
your access to resources is det...
Identity and Access Management PASSED
Actual Exam Questions and CORRECT
Answers
The first stage is identification is where a username or smart card is used, followed by
authentication where a password or pin is inserted and then the authorization stage where
your access to resources is determined. - CORRECT ANSWER- ✔✔What are the three main
components of identity and access management? Place them in the correct order.
The UDP-based AAA solution is RADIUS. The two that are TCP-based are TACACS+ and
DIAMETER. - CORRECT ANSWER- ✔✔What are the TCP-based and UDP-based AAA
servers? Name three.
The directory services protocol that stores object in an X500 format is Lightweight Directory
Access Protocol (LDAP). - CORRECT ANSWER- ✔✔What is the directory services
protocol that stores objects in X500 format?
Rule-based authentication can be used for the whole company or department. For example,
contractors are allowed access from 9 a.m. to 5 p.m. - CORRECT ANSWER- ✔✔What type
of access management control is used for the whole company or department?
Someone who works in finished goods only needs a standard user account for work purposes.
- CORRECT ANSWER- ✔✔What type of account would someone need if they worked in
finished goods?
RADIUS and TACACS+ are both server use accounting to track when users access and leave
a system. - CORRECT ANSWER- ✔✔Explain why a RADIUS or TACACS+ server uses
accounting.
Federation services use cookies to authenticate users. - CORRECT ANSWER- ✔✔What type
of identity access management control uses cookies to authenticate users?
The protocol being used is OAuth2.0 but the authentication type is known as OpenID
Connect. - CORRECT ANSWER- ✔✔When we log into a website such as Airbnb and we are
, asked to enter our Facebook account details for authentication, what type of authentication
model are we using?
Biometric authentication uses the crossover error rate to measure when the Failure
Acceptance Rate is equal to the Failure Rejection Rate (FRR). - CORRECT ANSWER-
✔✔When using biometric authentication, how is the crossover error rate measured?
Group policy can be used to prevent someone from using a CD/DVD drives as well as setting
up the password policy for the whole domain. - CORRECT ANSWER- ✔✔What tools
should we use to prevent someone from using CD/DVD drives as well as setting up the
password policy for the whole domain?
Federation services is a third party to third party authentication model that uses extended
attributes. - CORRECT ANSWER- ✔✔What is a third-party to third-party authentication
model that uses extended attributes?
Open source federation services are called Shibboleth, which also use cookies. - CORRECT
ANSWER- ✔✔What is an open source third-party to third-party authentication model that
uses extended attributes?
Federation services through a WAP are called RADIUS federation. - CORRECT ANSWER-
✔✔What is a third-party to third-party authentication model that uses extended attributes and
connects through a WAP?
Using Single Sign-On (SSO) allows you to access the systems using one set of credentials. -
CORRECT ANSWER- ✔✔When we access the company network, we need to insert four
sets of credentials to access resources. What type of identity and access management concept
would make accessing these resources simpler?
A security guard is a deterrent who checks identity but is also a biometric scanner as they can
carry out facial recognition. - CORRECT ANSWER- ✔✔What type of identity and access
management biometric characteristics does a security guard possess?
CHAP authentication has the authenticator send the challenge that is to encrypt the login
password. - CORRECT ANSWER- ✔✔What type of authentication has the authenticator
send a challenge that is used by the person logging in to encrypt their password?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.