Deck 10: Identity Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 10: Identity Management
1
5)In the Internet world, most certificates follow the LDAP standard defined in RFC 2459 by IETF.
False
2
9)The IdM platform gets all of its identity data from the ____.
A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
B
3
8)The IdM ____ provide common services for all the components within the IdM platform.
A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
A) infrastructure services
B) identity data layer
C) object identity management
D) user identity management
A
4
16)In ____ modeling, the administrator programs a set of rules that would apply to the identity data set.
A) rule-based
B) role-based
C) location-based
D) group-based
A) rule-based
B) role-based
C) location-based
D) group-based
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
14)The ____ engine provides the means of subdividing the management of the huge amount of identity data that an IdM system processes.
A) modeling
B) delegated administration
C) audit
D) workflow
A) modeling
B) delegated administration
C) audit
D) workflow
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
19)____ is defined as a business process to service a request associated with an identity.
A) Workflow
B) DN
C) Provisioning
D) Data broker
A) Workflow
B) DN
C) Provisioning
D) Data broker
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
10)A(n) ____ allows users or applications to find resources that have characteristics needed for a particular task.
A) access manager
B) password manager
C) data store
D) system of records
A) access manager
B) password manager
C) data store
D) system of records
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
18)The entity needs to remember only one strong password to access all resources instead of trying to remember and manage different passwords for different systems. We call this ____.
A) password recycling
B) password reuse
C) password grouping
D) password synchronization
A) password recycling
B) password reuse
C) password grouping
D) password synchronization
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
2)Data in an X.500 directory is organized in a linear name space capable of supporting large amounts of information.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
17)The ____ component as an IdM infrastructure is an end-to-end framework for capturing identity and security operational logs.
A) data broker
B) DA engine
C) audit
D) workflow engine
A) data broker
B) DA engine
C) audit
D) workflow engine
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
12)____ is a mechanism for defining a collection of attributes for the instantiation of a directory entry.
A) Object class (OC)
B) Distinguished name (DN)
C) Secondary identifying document (SID)
D) Identifying characteristics (IC)
A) Object class (OC)
B) Distinguished name (DN)
C) Secondary identifying document (SID)
D) Identifying characteristics (IC)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
13)____ is defined as the procedural steps, the identity involved, the required input, and the output of resources needed to produce a given result such as a product or service.
A) Entity
B) Audit
C) Data broker
D) Workflow
A) Entity
B) Audit
C) Data broker
D) Workflow
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
11)The job of the ____ component is to process identity information.
A) access manager
B) data broker
C) password manager
D) system records
A) access manager
B) data broker
C) password manager
D) system records
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
6)A(n) ____ is defined as an object that has separate and distinct existence with objective or conceptual reality.
A) characteristic
B) distinguished name
C) identity
D) entity
A) characteristic
B) distinguished name
C) identity
D) entity
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
7)____ is a standard document that refers to the identity of an entity.
A) IC
B) SIC
C) SID
D) PID
A) IC
B) SIC
C) SID
D) PID
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
20)The ____ works with infrastructure services in the IdM platform to provide replicable rules for repeatable automated workflow for provisioning accounts and other services associated with an identity.
A) provisioning module
B) audit module
C) password management module
D) workflow module
A) provisioning module
B) audit module
C) password management module
D) workflow module
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
15)The goal of the ____ is to model the identity data set into a particular format.
A) DA engine
B) workflow engine
C) data broker
D) modeling module
A) DA engine
B) workflow engine
C) data broker
D) modeling module
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
3)Data entries in LDAP directory are arranged in a hierarchical structure that reflects political, geographic, and/or organizational boundaries.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
4)A password can be both strong and easy to remember at the same time.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
1)Security enhancement and cost savings are the two major reasons for identity management.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
31)Under the IDIM model, the core of the IdM platform is the IdM ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
39)What are some of the characteristics of a poor/weak password?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
22)A(n) ____ is an electronic document used to identify an individual, a company, or any other entity.
A) SPML certificate
B) DN certificate
C) digital certificate
D) CA certificate
A) SPML certificate
B) DN certificate
C) digital certificate
D) CA certificate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
28)____________________ is a collection of information about objects arranged in some order that gives details about each object.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
34)Briefly describe the Universal ID approach.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
23)The ____ in the IdM platform is a specialized module that provides PKI-related services.
A) password management module
B) PKIM
C) SPML
D) provisioning module
A) password management module
B) PKIM
C) SPML
D) provisioning module
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
25)____ is the ability to determine what data an identity can view, alter, create, or delete and/or what systems that identity can change.
A) Identity
B) Entity
C) Authentication
D) Authorization
A) Identity
B) Entity
C) Authentication
D) Authorization
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
36)What are the primary goals for IdM in the private sector?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
41)What are the main characteristics of passphrases?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
29)____________________ is the suite of communications protocols used to connect hosts on the Internet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
26)____ is a XML-based framework for Web services that enables the exchange of authentication and authorization information among different organizations.
A) SMPL
B) SAML
C) LDAP
D) X.500
A) SMPL
B) SAML
C) LDAP
D) X.500
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
27)____________________ refers to a set of technologies intended to manage a basic issue: information about the identity of users, employees, contractors, customers, partners, and vendors is distributed among too many systems and is consequently difficult to manage securely.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
24)____ is the assurance that an identity to some computerized transaction is not an impostor.
A) Authentication
B) Identity
C) Authorization
D) Entity
A) Authentication
B) Identity
C) Authorization
D) Entity
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
21)____ is developed as a standard from OASIS using an XML-based framework for exchanging user, resource, and service provisioning information between cooperating organizations.
A) X.500
B) SPML
C) LDAP
D) OSI
A) X.500
B) SPML
C) LDAP
D) OSI
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are some of the characteristics of a strong password?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
37)Describe the main characteristics of a virtual directory.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
35)Briefly described the Clustered ID approach.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
33)What are some other fields or areas that are combined with security technology when providing a security solution?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
38)What are the RFC that define LDAP version 3?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
30)Each LDAP directory entry is a collection of attributes with a unique name called a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)What are the main characteristics of UDDI?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck