Exam 7: Identity and Access Management
Exam 1: Introduction to Cloud Computing32 Questions
Exam 2: Virtual Hardware31 Questions
Exam 3: Migration to the Cloud40 Questions
Exam 4: Cloud Infrastructure31 Questions
Exam 5: Cloud Connectivity and Troubleshooting33 Questions
Exam 6: Securing Cloud Resources32 Questions
Exam 7: Identity and Access Management37 Questions
Exam 8: Cloud Storage32 Questions
Exam 9: Managing Cloud Capacity and Performance41 Questions
Exam 10: Cloud Automation41 Questions
Select questions type
Emily is analyzing the logs for one of the servers in her organization. She sees three failed attempts to log in with an incorrect password. She then sees continued attempts to log in with a different error message. Which of the following could be the reason the error message changed?
(Multiple Choice)
4.7/5
(34)
Blake has been examining the logs on one of the servers that he is responsible for that is hosted on a cloud service provider. He finds an instance where one of the employees has managed to give himself unauthorized administrative access on the server. Which of the following has occurred?
(Multiple Choice)
4.7/5
(38)
Noah has gone to work for the government and sees that some systems use a method of labeling data as classified, secret, and top secret rather than creating groups of users and applying permissions for those groups. Which of the following describes these systems of labeling data?
(Multiple Choice)
4.8/5
(35)
Piper is auditing the accounts on the cloud platform her company uses. She sees a master user that retains complete access and action permissions no matter what permissions are also given to the other users. Which of the following is the username for that account?
(Multiple Choice)
4.8/5
(36)
Mark manages a custom application that resides on a cloud service provider that relies on users to authenticate by means of entering a username and password. Which of the following factors of authentication does this application use?
(Multiple Choice)
4.8/5
(32)
Tia has run a report on one of the Linux servers she manages and sees that one of the users has not changed their password in over two years. Which of the following parameters should she configure on the server?
(Multiple Choice)
4.9/5
(37)
Judy's company is implementing a new authentication technology that requires assigning certificates to users and issuing smart cards. Which of the following does she need to install and configure to manage the certificates?
(Multiple Choice)
4.8/5
(43)
James works for a company where administrators and users add individual granular permissions to various resources. Which of the following describes the access control methods used by this company?
(Multiple Choice)
4.8/5
(42)
Sharon is having trouble logging into the new cloud-based web application that her small company uses. It asks whether she wants to use a local account or an OpenID account. Which of the following is used by OpenID in order to implement authentication?
(Multiple Choice)
5.0/5
(37)
Owen has just installed Linux as a virtual machine on the company's cloud service provider. He has configured the server to define a set of users to determine who has access to individual files and folders. Which of the following terms can describe the set of users?
(Multiple Choice)
4.8/5
(39)
Cherise has been tasked with increasing the security for the company's data center. Currently there is a proximity badge reader on the door. She is considering adding an iris camera to the door. Once it is in place, which of the following factors will be used for authentication into the data center? (Choose all that apply.)
(Multiple Choice)
4.8/5
(30)
Sarah has deployed a private cloud infrastructure that requires users to insert a smart card into their computer or into a card reader in order to authenticate them to use the applications. The smart card is associated with a certificate for each user, which is verified against a certificate authority. Which of the following has she deployed?
(Multiple Choice)
4.7/5
(30)
Darius manages a directory of users for one of the domains within his organization. Which of the following describes the protocol in use for querying the directory?
(Multiple Choice)
4.9/5
(26)
Fictional Corp has a variety of applications deployed across multiple cloud service providers. Claude has been tasked with making sure that users aren't required to have separate accounts for each application. Which of the following should he look at using to meet that goal?
(Multiple Choice)
5.0/5
(34)
Fictional Corp uses a cloud service provider that provides a framework of techniques and tools for managing the identities of people and applications that allow for access to cloud resources. Which of the following describe this framework?
(Multiple Choice)
4.8/5
(38)
Martin is running an analysis on the logs from one of the web servers that resides on the company's private cloud. He finds that some users are accessing a site they shouldn't be able to, as the firewall should have rules to prevent them from accessing the server. Which of the following might be how they were able to access the site?
(Multiple Choice)
4.9/5
(43)
Kevin is implementing SSO functionality for his organization. Which of the following authentication standards could he use to implement it?
(Multiple Choice)
4.9/5
(35)
Showing 21 - 37 of 37
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)