Question 1
Which authentication protocol is noted for its use with X.500 directories and distinguished names?
Question 2
What is a major benefit of federation in identity management?
Question 3
What is a key feature of centralized authentication systems?
Question 4
In IAM, what is the primary purpose of identity proofing?
Question 5
What aspect is crucial when implementing IAM technologies to ensure they function well together?
Question 6
Mandatory Access Control (MAC) is most aligned with what principle in IAM?
Question 7
What is one key advantage of implementing Single Sign-On (SSO) in an organization?
Question 8
Which of the following represents the start of the IAM process?
Question 9
What does SAML primarily offer within the IAM framework?
Question 10
Which of the following is NOT typically considered an IAM user attribute?
Question 11
Within federated identity management systems, what is necessary between service providers?
Question 12
What describes the process of removing user access as a final step in the IAM lifecycle?
Question 13
Which method of identity proofing involves the use of personal history for verification?
Question 14
Why is it important to restrict system-level access within IAM policies?
Question 15
What is the primary role of OAuth in the IAM framework?