100% Free Exams (No login or credit card required)

Section 4.6

Demonstrate your acquired knowledge about implementing and maintaining identity and access
management. This will demonstrate your proficiency for section 4.6 of the Security+ SY0-701 objectives.

1 / 25

Which protocol is typically used by directory services to query user authentication data?

2 / 25

Which tool allows users to authenticate once and gain access to multiple systems?

3 / 25

A failed MFA login due to GPS mismatch most likely used which factor?

4 / 25

What role does attestation play in identity and access management?

5 / 25

Which type of access control relies on system-enforced classifications like “Top Secret”?

6 / 25

Which is the greatest benefit of using passwordless authentication systems?

7 / 25

Why is group policy critical to operating system security in large environments?

8 / 25

In which scenario would attribute-based access control (ABAC) be preferred?

9 / 25

An attacker exploits credentials of multiple users without detection. Which control was likely missing?

10 / 25

How does password vaulting enhance security in privileged access management?

11 / 25

Which implementation enables SSO using web-based authentication between domains?

12 / 25

Which password policy best mitigates brute force attacks over time?

13 / 25

In a federated identity system, what component confirms a user’s identity across systems?

14 / 25

Which control method is used to ensure that access rights do not exceed what’s needed?

15 / 25

What does the use of ephemeral credentials improve?

16 / 25

Which factor is used in multifactor authentication involving a smart card?

17 / 25

What is the main concern when failing to de-provision a former employee's account?

18 / 25

In discretionary access control (DAC), who determines access to resources?

19 / 25

Why is time-of-day access control used in some environments?

20 / 25

A system that limits access based on defined policies and environmental conditions is using:

21 / 25

Which identity proofing process provides the strongest assurance?

22 / 25

What feature of OAuth enables secure third-party access without sharing user credentials?

23 / 25

What makes SAML a preferred choice for enterprise SSO implementations?

24 / 25

Which access control method is best for enforcing organizational policy with predefined job roles?

25 / 25

What is the main benefit of just-in-time (JIT) access for privileged accounts?

Your score is

The average score is 0%

0%