Answer page: Building an identity and access management architecture quiz

1. Answer: b. The ID management system is authoritative and can overwrite data in managed systems.
Learn more about these two models in the webcast, Demystifying identity management and access control


















































2. Answer: d. All of the above.
Learn more about Web application access control in the article, From the gateway to the application: Effective access control strategies.


















































3. Answer: c. They require access to the managed systems for reporting.
Learn more about federated identity management systems in the webcast, Demystifying identity management and access control.
























































4. Answer: a. They provide rich mechanisms to manage groups, roles and privileges but tend to focus on controlling access only to resources that can be addressed by a URL.
Learn more about access control products in the article, From the gateway to the application: Effective access control strategies.
























































5. Answer: d. Strong security design.
Learn more about the features to look for in an identity management product in the webcast, Demystifying identity management and access control.
















Did you pass the quiz? Send us your results. To review the questions you got wrong, visit the materials in the Building an identity and access management architecture lesson plan of our Identity and Access Management Security School.

This was last published in August 2006

Dig Deeper on Active Directory and LDAP Security

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close