Identity and Access Manag:

Quiz: Using IAM tools to improve compliance

SearchSecurity.com

SearchSecurity.com Security School
This quiz is part of Using IAM tools to improve compliance, a lesson in SearchSecurity.com's Identity and Access Management Security School. Visit the Using IAM tools to improve compliance lesson page for additional learning resources.

1. The information security team must also get which group involved in order to have a successful identity and access management (IAM) deployment?

  1. Networking
  2. Human resources
  3. Finance
  4. Physical security

2. The four steps of role management (in the proper order) are:

  1. Audit, research, plan and deploy.
  2. Research, plan, deploy and integrate.
  3. Research, plan, deploy and audit.
  4. Research, audit, plan and deploy.

3. Fill in the blank: The greatest barrier to a successful IAM project is ________ .

  1. Business processes.
  2. Legacy technology.
  3. Poorly defined user roles.
  4. All of the above.

4. Fill in the blank: User administration, delegation of user administration, role-based access control and self service are examples of ________ requirements for an IAM project.

  1. mandatory
  2. non-mandatory
  3. functional
  4. non-functional
  5. none of the above

5. When analyzing an IAM vendor for your project, you should review what characteristics of the vendor?

  1. The vendor's financial security.
  2. The size of the vendor's install base.
  3. The number and quality of the vendor's customer references.
  4. The vendor's strategic product vision.
  5. All of the above.
  6. Both A and D.

If you answered two or more questions incorrectly, revisit the materials featured in this lesson from SearchSecurity.com's Identity and Access Management Security School:

  • Tip: How to use role management and provisioning in compliance
  • Podcast: Shopping for provisioning and password management tools
  • Webcast: Provisioning and Password Management: A Compliance Remedy?

    If you answered four or more questions correctly, return to SearchSecurity.com's Identity and Access Management Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

    31 Jan 2007