Identity and Access Manag

Quiz: Using IAM tools to improve compliance Security School
This quiz is part of Using IAM tools to improve compliance, a lesson in's Identity and Access Management Security School. Visit the Using IAM tools to improve compliance lesson page for additional learning resources.

1. The information security team must also get which group involved in order to have a successful identity and access management (IAM) deployment?

  1. Networking
  2. Human resources
  3. Finance
  4. Physical security

2. The four steps of role management (in the proper order) are:

  1. Audit, research, plan and deploy.
  2. Research, plan, deploy and integrate.
  3. Research, plan, deploy and audit.
  4. Research, audit, plan and deploy.

3. Fill in the blank: The greatest barrier to a successful IAM project is ________ .

  1. Business processes.
  2. Legacy technology.
  3. Poorly defined user roles.
  4. All of the above.

4. Fill in the blank: User administration, delegation of user administration, role-based access control and self service are examples of ________ requirements for an IAM project.

  1. mandatory
  2. non-mandatory
  3. functional
  4. non-functional
  5. none of the above

5. When analyzing an IAM vendor for your project, you should review what characteristics of the vendor?

  1. The vendor's financial security.
  2. The size of the vendor's install base.
  3. The number and quality of the vendor's customer references.
  4. The vendor's strategic product vision.
  5. All of the above.
  6. Both A and D.

If you answered two or more questions incorrectly, revisit the materials featured in this lesson from's Identity and Access Management Security School:

  • Tip: How to use role management and provisioning in compliance
  • Podcast: Shopping for provisioning and password management tools
  • Webcast: Provisioning and Password Management: A Compliance Remedy?

    If you answered four or more questions correctly, return to's Identity and Access Management Security School and begin another lesson, or try another school in's Security School Course Catalog.

    This was first published in January 2007

  • There are Comments. Add yours.

    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: