Section 17.156 Identity and Access Management (IAM) Solutions Flashcards

Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.

1
Q

Identity and Access Management (IAM)

A

Ensures right individuals have right access to right resources for right reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IAM Technologies

A

Provide tools for business processes that facilitate the management of electronic identities, including…

Password management
Network access control
Digital identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM Processes (IAAA)

Identification

A

Claiming identity, e.g., username, email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAM Processes (IAAA)

Authentication

A

Verifying user, device, or system identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IAM Processes (IAAA)

Authorisation

A

Determining user permissions after authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IAM Processes (IAAA)

Accounting/Auditing

A

Tracking and recording user activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly