Deck 8: Identity and Access Management

ملء الشاشة (f)
exit full mode
سؤال
Identity discovery involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A distinct record in a system of record is called an

A) Password
B) Username
C) Identity
D) Account
سؤال
Identity reconciliation involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
سؤال
A person registry

A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
C) Is the process of comparing each discovered identity to a master record of all individuals in the organization
D) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
سؤال
For use as a biomarker, a physical trait must be

A) Searchable
B) Universal
C) Attractive
D) Inexpensive
سؤال
Authentication is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
سؤال
Hardware or software tokens are used for

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The minute differences in physical traits used to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
سؤال
Password synchronization technologies

A) Require the presentation of a token for authentication
B) Allow a user to authenticate once and obtain access to all authorized resources
C) Allow nodes in an insecure network to securely identify themselves to each other using tokens
D) Ensure that the user has the same username and password on all systems
سؤال
Biometrics is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
سؤال
A password is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
سؤال
A system of record is

A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Records from which information is retrieved by identifying particulars assigned to the individual
C) Process of comparing each discovered identity to a master record of all individuals in the organization
D) Central hub that connects identifiers from all Systems of Records into a single "master" identity
سؤال
The stages in identity management are

A) Denial, anger, bargaining, acceptance
B) Plan, do, check, act
C) Plan, acquire, deploy, manage
D) Discovery, reconciliation and enrichment
سؤال
Access management involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Making decisions about granting users access to resources
D) Collecting data about each individual's relationship to the organization
سؤال
Kerberos is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
سؤال
Match/ merge is an industry term for

A) Identity reconciliation
B) Identity discovery
C) Identity enrichment
D) Access control
سؤال
Identity enrichment involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
سؤال
An individual's affiliation with the organization is called their

A) Access
B) Role
C) Account
D) Password
سؤال
Single sign-on technologies

A) Ensure that the user has the same username and password on all systems
B) Have no single point of failure
C) Allow a user to authenticate once and obtain access to all authorized resources
D) Allow nodes in an insecure network to securely identify themselves to each other using tokens
سؤال
The access registry

A) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
B) Is the process of comparing each discovered identity to a master record of all individuals in the organization
C) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
D) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
سؤال
Identity management involves

A) Identifying individuals and collecting data to determine access to resources
B) Providing security administrators with a single view of an individual's accounts and permissions across the entire organization
C) Maintaining records from which information is retrieved by identifying particulars assigned to the individual
D) Process of comparing each discovered identity to a master record of all individuals in the organization
سؤال
Federations are useful to

A) Authenticate users within an organization
B) Determine the authorizations of users to resources
C) Bridge authentication systems in separate organizations
D) Eliminate single points of failure in IT systems
سؤال
Kerberos has been very useful in securing corporate desktop infrastructures
سؤال
OpenID uses an

A) Insecure model of authentication
B) Centralized model for authentication
C) Federated model for authentication
D) Distributed model for authentication
سؤال
Kerberos has been very useful in securing web applications
سؤال
OAuth allows users to

A) Grant access to resources on one site to another site
B) Authenticate centrally
C) Authenticate using a federation
D) Authenticate using kerberos
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Identity and Access Management
1
Identity discovery involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
A
2
A distinct record in a system of record is called an

A) Password
B) Username
C) Identity
D) Account
Identity
3
Identity reconciliation involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
B
4
A person registry

A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
C) Is the process of comparing each discovered identity to a master record of all individuals in the organization
D) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
For use as a biomarker, a physical trait must be

A) Searchable
B) Universal
C) Attractive
D) Inexpensive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
Authentication is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
Hardware or software tokens are used for

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The minute differences in physical traits used to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
Password synchronization technologies

A) Require the presentation of a token for authentication
B) Allow a user to authenticate once and obtain access to all authorized resources
C) Allow nodes in an insecure network to securely identify themselves to each other using tokens
D) Ensure that the user has the same username and password on all systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
Biometrics is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
A password is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
A system of record is

A) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
B) Records from which information is retrieved by identifying particulars assigned to the individual
C) Process of comparing each discovered identity to a master record of all individuals in the organization
D) Central hub that connects identifiers from all Systems of Records into a single "master" identity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
The stages in identity management are

A) Denial, anger, bargaining, acceptance
B) Plan, do, check, act
C) Plan, acquire, deploy, manage
D) Discovery, reconciliation and enrichment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
Access management involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Making decisions about granting users access to resources
D) Collecting data about each individual's relationship to the organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
Kerberos is

A) The process of proving that a user is the owner of the identity being used
B) A secret series of characters known only to the user
C) The use of minute differences in physical traits to prove identity
D) A protocol that allows nodes in an insecure network to securely identify themselves to each other using tokens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
Match/ merge is an industry term for

A) Identity reconciliation
B) Identity discovery
C) Identity enrichment
D) Access control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
Identity enrichment involves

A) Locating all new and updated identities in the organization
B) Comparing each discovered identity to a master record of all individuals in the organization
C) Collecting data about each individual's relationship to the organization
D) Making decisions about granting users access to resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
An individual's affiliation with the organization is called their

A) Access
B) Role
C) Account
D) Password
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
Single sign-on technologies

A) Ensure that the user has the same username and password on all systems
B) Have no single point of failure
C) Allow a user to authenticate once and obtain access to all authorized resources
D) Allow nodes in an insecure network to securely identify themselves to each other using tokens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
The access registry

A) Is the set of records from which information is retrieved by identifying particulars assigned to the individual
B) Is the process of comparing each discovered identity to a master record of all individuals in the organization
C) Is the central hub that connects identifiers from all Systems of Records into a single "master" identity
D) Provides security administrators with a single view of an individual's accounts and permissions across the entire organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
Identity management involves

A) Identifying individuals and collecting data to determine access to resources
B) Providing security administrators with a single view of an individual's accounts and permissions across the entire organization
C) Maintaining records from which information is retrieved by identifying particulars assigned to the individual
D) Process of comparing each discovered identity to a master record of all individuals in the organization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Federations are useful to

A) Authenticate users within an organization
B) Determine the authorizations of users to resources
C) Bridge authentication systems in separate organizations
D) Eliminate single points of failure in IT systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Kerberos has been very useful in securing corporate desktop infrastructures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
OpenID uses an

A) Insecure model of authentication
B) Centralized model for authentication
C) Federated model for authentication
D) Distributed model for authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
Kerberos has been very useful in securing web applications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
OAuth allows users to

A) Grant access to resources on one site to another site
B) Authenticate centrally
C) Authenticate using a federation
D) Authenticate using kerberos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.