Exam 10: Identity Management
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
____ is defined as the procedural steps, the identity involved, the required input, and the output of resources needed to produce a given result such as a product or service.
(Multiple Choice)
5.0/5
(31)
____ is a standard document that refers to the identity of an entity.
(Multiple Choice)
4.9/5
(29)
The IdM ____ provide common services for all the components within the IdM platform.
(Multiple Choice)
4.7/5
(34)
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(45)
The IdM platform gets all of its identity data from the ____.
(Multiple Choice)
4.8/5
(31)
____ is the assurance that an identity to some computerized transaction is not an impostor.
(Multiple Choice)
4.9/5
(35)
The entity needs to remember only one strong password to access all resources instead of trying to remember and manage different passwords for different systems. We call this ____.
(Multiple Choice)
4.8/5
(26)
Data entries in LDAP directory are arranged in a hierarchical structure that reflects political, geographic, and/or organizational boundaries.
(True/False)
4.9/5
(42)
Each LDAP directory entry is a collection of attributes with a unique name called a(n) ____________________.
(Short Answer)
4.9/5
(35)
The job of the ____ component is to process identity information.
(Multiple Choice)
4.9/5
(34)
Data in an X.500 directory is organized in a linear name space capable of supporting large amounts of information.
(True/False)
4.9/5
(41)
A(n) ____ allows users or applications to find resources that have characteristics needed for a particular task.
(Multiple Choice)
4.9/5
(44)
A password can be both strong and easy to remember at the same time.
(True/False)
4.9/5
(34)
A(n) ____ is defined as an object that has separate and distinct existence with objective or conceptual reality.
(Multiple Choice)
4.9/5
(34)
____ is the ability to determine what data an identity can view, alter, create, or delete and/or what systems that identity can change.
(Multiple Choice)
4.8/5
(36)
____ is defined as a business process to service a request associated with an identity.
(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)