Identity and Access Management Flashcards
Which biometric modality is the MOST invasive for the subject?
A. Iris scan
B. Palm scan
C. Fingerprint
D. Retina scan
D. Retina scan
Which of these authentication factors would best be considered “something you are”?
A. 802.1x wireless network
B. Personal Identification number
C. Smart card
D. Ocular biometric
D. Ocular biometric
Which of these is a strict mathematical access control policy that is uniformly enforced across all subjects and objects within the boundary of an information system?
A. MAC
B. ABAC
C. DAC
D. RBAC
A. MAC
Which is an identity security initiative from Microsoft that helps organizations counter cyberthreats by monitoring, detecting, and stopping unauthorized access to critical resources?
A. Network admission control (NAC)
B. Privilege access management (PAM)
C. Virtual private networking (VPN)
D. DomainKeys identified mail (DKIM)
B. Privilege access management (PAM)
Which term refers to the formation of a trusted relationship between separate entities and third parties, such as cloud/application vendors or partners, enabling them to share identities and authenticate users across domains and realms?
A. Reputation filtering
B. Transitive relationship management
C. Dual operator policy
D. Federated identity management
D. Federated identity management
Which is the process of providing sufficient information (e.g., identity history, credentials, documents) to establish an identity?
A. Provisioning
B. Authorization
C. Proofing
D. Authentication
C. Proofing
Which of these are common elements of an enforceable password policy?
A. Reuse
B. Mnemonic
C. Complexity
D. Age
E. Simplicity
F. Length
A. Reuse
C. Complexity
D. Age
F. Length