Identity and Access Management Questions and Answers with complete solution
Which of these does Mike give as an example of an inherence factor? - Hardware token - Username/password - Fingerprint reader - Smart card - Username/password Which type of access control is based on data labels? - DAC - MAC - RBAC - HMAC - MAC What determines the number of times you can unsuccessfully attempt to log in before you are shut out of the system for a specific period? - Account lockout threshold In Linux file permissions which action does the letter "r" allow? - Open a file True or False: Mike says shared accounts are a good idea in an Enterprise environment? - False What is the RADIUS supplicant? - They system tying to authenticate Using Kerberos, what is the domain controller called? - Key distribution center (KBC) Which of these is a tool you could use to set up single sign on within a LAN? - Windows Active Directory
Written for
- Institution
- Identity and Access Management
- Course
- Identity and Access Management
Document information
- Uploaded on
- November 22, 2023
- Number of pages
- 1
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
identity and access management
Also available in package deal