1) Confidentiality
2) Authentication
3) Integrity
4) Audit Logging
Ans: 1) Confidentiality
Q.2 Which of the following is used to ensure that the users are who they claim to be?
1) Identity management
2) Authorization
3) Authentication
4) Administration
Ans: 3) Authentication
Q.3 _______________
is a solution that provides a mechanism to manage the authentication of users and implement business rules determining user access to applications and data.
1) Identity management
2) Authorization
3) Access management
Ans: 3) Access management
Q.4 Which of the following aims to manage the user identities in the multiple directories and identity stores across an organization?
1) Authentication
2) Authorization
3) Identity Management
Ans: 3) Identity Management
Q.5 Which of the following is used to grant users access to resources?
1) Administration
2) Authentication
3) Authorization
4) Identity management
Ans: 3) Authorization
No comments:
Post a Comment
If you have any doubts, Please let us know.