
CIAM : Exam (MOCK)
Quiz by Gaurav Sharma Cyber Security Expert
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
106 questions
Show answers
- Q1What does RBAC stand for in the context of access control?Rule-Based Access ControlRole-Based User ControlRole-Based Access ControlRandom-Based Access Control30s
- Q2What is the purpose of multi-factor authentication (MFA) in information security?Using a physical key onlyCombining two or more independent credentialsAuthenticating users through IP address verificationUsing a single password for all systems30s
- Q3What does the principle of least privilege aim to achieve in information security?Allowing all users to have administrative accessGranting users more access than they needDenying all access by defaultGranting users the minimum access necessary to perform their job30s
- Q4What is the primary goal of access governance within an organization?Granting unrestricted access to all usersEnsuring compliance with regulations and policiesIncreasing operating costsAllowing users to manage their own access30s
- Q5What role does segregation of duties play in Identity and Access Management (IAM)?Allowing all users to have full administrative privilegesIncreasing complexity of IAM processesCombining critical tasks under one personReducing the risk of fraud or error by dividing tasks30s
- Q6What does the term 'IAM' stand for in the context of information security management?Identity and Access ManagementInformation Access ManagementInternet Access ManagementIndividual Access Management30s
- Q7What is the purpose of a Digital Certificate in authentication processes?Granting access to all users by defaultVerifying the identity of users or devicesProviding physical access to facilitiesStoring user passwords securely30s
- Q8What is the role of Role-Based Access Control (RBAC) in access management?Randomly assigning access rights to usersAllowing users to define their own rolesGranting access based on locationAssigning roles to users based on predefined policies30s
- Q9What is the primary purpose of access provisioning in Identity and Access Management (IAM)?To create new user accounts manuallyTo randomly revoke accessTo increase the number of privileged accountsTo ensure users have the appropriate access rights30s
- Q10What authentication factor does a biometric scan fall under in multi-factor authentication (MFA)?Something you areSomething you haveSomething you knowSomething you learn30s
- Q11What is the primary goal of access provisioning?To increase the number of privileged accountsTo revoke access randomlyTo create new user accounts manuallyTo ensure users have the appropriate access rights30s
- Q12What is the purpose of segregation of duties in IAM?To reduce the risk of fraud or error by dividing tasksTo allow users to manage their own accessTo increase the complexity of IAM processesTo combine critical tasks under one person30s
- Q13What is multi-factor authentication (MFA)?Using a single password for all systemsAuthenticating users through IP address verificationCombining two or more independent credentialsUsing a physical key only30s
- Q14Which access control model assigns roles to users based on predefined policies?Rule-Based Access ControlMandatory Access ControlDiscretionary Access ControlRole-Based Access Control30s
- Q15What does the Zero Trust Model emphasize in security?Using only passwords for authenticationAllowing open access to all resourcesAlways verifying the identity of users and devicesTrusting all internal users by default30s