Section 4.6 Demonstrate your acquired knowledge about implementing and maintaining identity and accessmanagement. This will demonstrate your proficiency for section 4.6 of the Security+ SY0-701 objectives. 1 / 25 Which protocol is typically used by directory services to query user authentication data? OAuth LDAP DKIM SMTP 2 / 25 Which tool allows users to authenticate once and gain access to multiple systems? VPN concentrator Key vault Single sign-on Load balancer 3 / 25 A failed MFA login due to GPS mismatch most likely used which factor? Something you are Somewhere you are Something you have Something you know 4 / 25 What role does attestation play in identity and access management? Verifies password length Confirms device posture Grants temporary access Issues encryption keys 5 / 25 Which type of access control relies on system-enforced classifications like “Top Secret”? Discretionary Mandatory Rule-based Attribute-based 6 / 25 Which is the greatest benefit of using passwordless authentication systems? Reduced cost of password resets Easier password expiration policy Mitigation of phishing risk Increased reuse detection 7 / 25 Why is group policy critical to operating system security in large environments? Manages software installation Tracks network utilization Enforces access and audit rules Reduces log storage time 8 / 25 In which scenario would attribute-based access control (ABAC) be preferred? Assigning access by department Granting access based on risk score Scheduling login hours Mapping to job title 9 / 25 An attacker exploits credentials of multiple users without detection. Which control was likely missing? OAuth Password complexity User behavior analytics SSO tokens 10 / 25 How does password vaulting enhance security in privileged access management? Prevents reuse of keys Logs out inactive users Stores credentials securely Validates login frequency 11 / 25 Which implementation enables SSO using web-based authentication between domains? OpenID SAML LDAP TLS 12 / 25 Which password policy best mitigates brute force attacks over time? Limiting reuse Increasing complexity Requiring periodic resets Shortening expiration cycle 13 / 25 In a federated identity system, what component confirms a user’s identity across systems? Security key Identity provider Proxy server Application token 14 / 25 Which control method is used to ensure that access rights do not exceed what’s needed? Role-based Mandatory Least privilege Time-based 15 / 25 What does the use of ephemeral credentials improve? Identity federation Temporary access security Password history logging Token encryption speed 16 / 25 Which factor is used in multifactor authentication involving a smart card? Something you are Something you have Somewhere you are Something you know 17 / 25 What is the main concern when failing to de-provision a former employee's account? Password expiration Role misalignment Unauthorized access risk Multi-tenancy violation 18 / 25 In discretionary access control (DAC), who determines access to resources? Policy administrator Resource owner Directory service System integrator 19 / 25 Why is time-of-day access control used in some environments? Reduces password reuse Verifies identity locations Limits access to business hours Disables expired accounts 20 / 25 A system that limits access based on defined policies and environmental conditions is using: Role-based access control Discretionary access control Attribute-based access control Mandatory access control 21 / 25 Which identity proofing process provides the strongest assurance? Username verification Self-reported documents Biometric validation IP address checking 22 / 25 What feature of OAuth enables secure third-party access without sharing user credentials? Password hashing Access delegation Role restriction Identity federation 23 / 25 What makes SAML a preferred choice for enterprise SSO implementations? Simple key rotation support Supports biometric authentication XML-based token exchanges Works only with LDAP systems 24 / 25 Which access control method is best for enforcing organizational policy with predefined job roles? Rule-based Role-based Discretionary Mandatory 25 / 25 What is the main benefit of just-in-time (JIT) access for privileged accounts? Minimizes downtime after breaches Ensures password reuse is avoided Reduces length of access exposure Allows backup access during outages Your score isThe average score is 0% 0% Restart quiz Return to CompTia S+ SY0-701 Objectives