a) Restrict what operations/data the user can access
b) Auditing user activity in the system
c) Update email, mobile, first name, last name of the user
d) All of the above
Implementing Access Delegation for Web and Mobile Applications
Which token types are used during the UMA 2.0 flow?
a) PAT token
b) Kerberos token
c) NTLM token
d) OTP token
Which statement describes OAuth 2.0 most accurately?
a) It is an open standard used for access delegation
b) It is an open framework used for authentication
c) It is a framework designed for single sign-on
d) It is an open standard used for authentication and authorization
OIDC is an __________ protocol.
c) User management
d) All of the above
What is the purpose of having open standards?
a) When using application ecosystems open standards are used to authenticate the users.
b) To maintain a well defined message format for communication between the identity provider and service provider.
c) The identity provider should expose a metadata file which describes the open standards supported by the identity provider and when plugging a new application to the identity provider, the service provider should adhere to that metadata file information.
d) Open standards are developed by the application developers and passed to the identity provider in the authentication request to preserve the security of sensitive data.
Setting up Outbound Federation with Third-Party and Social Identity Providers
Based on the definition of identity federation, which protocols are ideal for identity federation?
A. OpenID Connect
a) A and B only
b) A, C and D only
c) A and C only
d) A, B, C and D
Securing Access to Web and Mobile Applications with Strong and Adaptive Authentication
What is NOT a decision factor in Adaptive Authentication?
a) Request or environment factors
b) User behavior
c) Analytics and machine learning
What authentication factor category does fingerprint data fall into?
a) Knowledge factor
b) Ownership factor
c) Inheritance factor
d) None of the above
Provisioning Users to External Systems with SCIM 2.0
Which is NOT a task that falls under a provisioning system?
a) Audit trails and reports
b) Workflow management
c) Single Sign-On
d) Password recovery capabilities
Implement Fine-grained Access Control Policies with XACML
Which statement about the responsibility of PEP is INCORRECT?
a) The PEP converts the request into an XACML authorization request
b) The PEP forwards the authorization request to the Policy Decision Point (PDP)
c) The PEP evaluates the authorization request against the policies it is configured with