Management (IAM) Questions with Answers
100% Solved
What takes place when a user gets access to resources and functionality that they are not
authorized or generally allowed to access? Privilege escalation
Which of these AAA accounting services involves performing showback against departmental
budgets and business unit allocations? Chargeback
Which IdM process involves collecting attributes or digital documents to support a claim of
identification for a specific subject to validate the veracity of the claim? Proofing
Which authentication and authorization protocol is used with IEEE 802.1X? RADIUS
Which type of SSO attack would involve secret cooperation between a principal and service
provider system to launch an attack? Collusion attack
Which is a basic and common identity layer on top of the OAuth 2.0 protocol? OIDC
Which authentication protocol relies on a Key Distribution Center (KDC)? Kerberos