Quiz: Using IAM tools to improve compliance

A five-question multiple-choice quiz to test your understanding of the content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Identity and Access Management Security School.

SearchSecurity.com Security School
This quiz is part of Using IAM tools to improve compliance , a lesson in SearchSecurity.com's Identity and Access Management Security School. Visit the Using IAM tools to improve compliance lesson page for additional learning resources.

1. The information security team must also get which group involved in order to have a successful identity and access management (IAM) deployment?

  1. Networking
  2. Human resources
  3. Finance
  4. Physical security

2. The four steps of role management (in the proper order) are:

  1. Audit, research, plan and deploy.
  2. Research, plan, deploy and integrate.
  3. Research, plan, deploy and audit.
  4. Research, audit, plan and deploy.

3. Fill in the blank: The greatest barrier to a successful IAM project is ________ .

  1. Business processes.
  2. Legacy technology.
  3. Poorly defined user roles.
  4. All of the above.

4. Fill in the blank: User administration, delegation of user administration, role-based access control and self service are examples of ________ requirements for an IAM project.

  1. mandatory
  2. non-mandatory
  3. functional
  4. non-functional
  5. none of the above

5. When analyzing an IAM vendor for your project, you should review what characteristics of the vendor?

  1. The vendor's financial security.
  2. The size of the vendor's install base.
  3. The number and quality of the vendor's customer references.
  4. The vendor's strategic product vision.
  5. All of the above.
  6. Both A and D.

If you answered two or more questions incorrectly, revisit the materials featured in this lesson from SearchSecurity.com's Identity and Access Management Security School:

  • Tip: How to use role management and provisioning in compliance
  • Podcast: Shopping for provisioning and password management tools
  • Webcast: Provisioning and Password Management: A Compliance Remedy?

    If you answered four or more questions correctly, return to SearchSecurity.com's Identity and Access Management Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

  • This was last published in January 2007

    Dig Deeper on Privileged access management

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.