Q1. Which one of the following is not an Identity and Access Management (IAM) process?
Q2. A user is trying to access an application. During the process, the user fills in a user name and password, and he submits the same to the application. Which one of the following represents such an activity?
Q3. Which statements, among the following, are a part of the Identity and Access Management facilitation process (this is a drag and drop type of question. Here you can draw a line from the list of answers from the left to the empty box on the right)?
Q4. Identity theft is what?
Q5. The following statements pertaining to Single Sign On (SSO) are true except.
Q6. Identity federation-related services and terminologies from the following list (this is a drag-and-drop type of question. Here, you can draw a line from the list of answers from the left to the empty box on the right).
Q7. Listening to communications surreptitiously between a client and a server is called what?
Q8. The Triple A of access control consists of what?