Sample Questions
Managing Users and Credentials
Which statement is a function of user management?
- a) Restrict what operations/data the user can access
- b) Auditing user activity in the system
- c) Update email, mobile, first name, last name of the user
- d) All of the above
Implementing Access Delegation for Web and Mobile Applications
Which statement describes OAuth 2.0 most accurately?
- a) It is an open standard used for access delegation
- b) It is an open framework used for authentication
- c) It is a framework designed for single sign-on
- d) It is an open standard used for authentication and authorization
Setting up Single Sign-On for Web and Mobile Applications
OIDC is an __________ protocol.
- a) Authorization
- b) Authentication
- c) User management
- d) All of the above
What is the purpose of having open standards?
- a) When using application ecosystems open standards are used to authenticate the users.
- b) To maintain a well defined message format for communication between the identity provider and service provider.
- c) The identity provider should expose a metadata file which describes the open standards supported by the identity provider and when plugging a new application to the identity provider, the service provider should adhere to that metadata file information.
- d) Open standards are developed by the application developers and passed to the identity provider in the authentication request to preserve the security of sensitive data.
Securing Access to Web and Mobile Applications with Strong and Adaptive Authentication
What is NOT a decision factor in Adaptive Authentication?
- A. Request or environment factors
- B. User behavior
- C. Analytics and machine learning
- D. Workflows
What authentication factor category does fingerprint data fall into?
- A. Knowledge factor
- B. Ownership factor
- C. Inheritance factor
- D. None of the above
Provisioning Users to External Systems with SCIM 2.0
Which is NOT a task that falls under a provisioning system?
- a) Audit trails and reports
- b) Workflow management
- c) Single Sign-On
- d) Password recovery capabilities