Networking and Security Concepts |
Fundamentals of Information Security
SET 1
1. What is the primary function of IAM?
o A) To encrypt data within the cloud
o B) To verify the identity of an entity and grant the correct level of access
o C) To monitor network traffic
o D) To provide a firewall for data protection
o Answer: B) To verify the identity of an entity and grant the correct level of access
2. Which of the following best describes the unique subjects involved in Identity and
Access Management (IAM)?
o A) Endpoints (devices), roles (permissions), applications (software), personnel
(employees), and servers (machines)
o B) Only personnel (employees) and servers (machines)
o C) Endpoints (devices) and applications (software) only
o D) Roles (permissions) and applications (software) only
o Answer: A) Endpoints (devices), roles (permissions), applications (software), personnel
(employees), and servers (machines)
3. Which of the following is a primary function of Identity and Access Management
(IAM) tools?
o A) To manage user identities and their access rights
o B) To encrypt data during transmission
, o C) To monitor network traffic for anomalies
o D) To provide antivirus protection
o Answer: A) To manage user identities and their access rights
4. Which of the following tasks is NOT typically associated with Identity and Access
Management (IAM)?
o A) Account creation and deprovisioning
o B) Network performance monitoring
o C) Account auditing
o D) Evaluating identity-based threats
o Answer: B) Network performance monitoring
5. Which of the following poses the greatest threat to the security of an organization's
Identity and Access Management (IAM) system?
o A) Weak password policies that allow easy guessing
o B) Inadequate training for users on security practices
o C) Compromised privileged accounts with extensive access rights
o D) Lack of regular audits on user access levels
o Answer: C) Compromised privileged accounts with extensive access rights
6. Which of the following best describes the primary purpose of Multifactor
Authentication (MFA)?
o A) To allow users to access multiple accounts with a single password
o B) To enhance security by requiring multiple forms of verification before granting access
o C) To simplify the login process by reducing the number of required credentials
o D) To eliminate the need for passwords altogether
o Answer: B) To enhance security by requiring multiple forms of verification before
granting access
7. Which of the following best describes the three categories of factors utilized in
Multifactor Authentication (MFA)?
o A) Something you know, something you own, and something you do
o B) Something you know, something you have, and something you are