Home
About Us
Services
Privileged Access Management (PAM)
Identity Governance & Administration (IGA).
Identity Access Management (IAM)
HR Automation Solution
Blogs
Case Study
Events
Contact Us
Quiz
Friday Challenge Vault
Q: Which of the following Windows 10 Enterprise features provides biometric identity access control?
Defender Antivirus
Defender ATP
Windows Hello
Credential Guard
Q: What does IGA stand for?
Identity Governance and Administration
I Get Angry
Initial Governance Acceptance
None of the Above
Q: What is Authentication?
Establishes Identity
Validates Identity
Assigns Access Rights
Same as Authorization
Q: Which of below is true about a qubit?
Can be 0 and 1 at the same time
Cannot be copied
Super position & entanglement are possible
All of the above
Q: Which of below is not a component of IGA?
Identity LifeCycle Management/ILM
Automation
Single Sign On
Governance
Q: How do you handle MFA for service accounts?
Use certificate-based authentication
Choose an on-prem MFA solution provider
Who cares, service accounts are not important
ITDR cant provide MFA to service accounts but can protect by blocking access in real time if high risk action is detected
Q: What is true of Identity Lifecycle Management (ILM)?
Includes usernames, IDs, job classes, workgroups & policies
Initial onboarding, modification and de-boarding of identities
Is hierarchical & maps entitlements to organizational groups & roles
All of the Above
Q: Which is not a principle of Zero Trust?
Verify Explicitly
Least Privilege
Assume Breach
Dont Worry. Be Happy
Q: What is MFA bombing?
Threat actor obtains valid credentials, then sends multiple authentication requests hoping to tire you out so you just push the button
Cant talk about it
Fear
Chaos
Q: Which is not a valid access control model?
Discretionary Access Control (DAC)
Role Based Access Control (RBAC)
Mandatory Access Control (MAC)
Cause Mom Said So Access Control (CMSS)
Q: What does ITDR stand for?
Identity, Threat, Detection, Response
Identity, Threat, Detection, Reasonable
Identity, Tootsie, Detection, Response
Identity, Threat, Death, Response
Q: Which of below is NOT something a user would provide to prove their identity?
Something they know
Something they believe
Something they have
Something they are
Q: What is FedRamp?
Federal Risk & Automation Management Program
FISMA for cloud services
Standard for accessing and authorizing cloud computing products and services
All of the above
Q: What is TOGAF?
The open group architecture framework
Totally organic grass artificial flavor
The only great artist forgotten
The original goal framework
Q: SwiftSlicer a data wiping malware was recently deployed using what?
GPO
Kubernetes
Likes
None of the Above
Q: Which of the following types of access control uses fences, security policies, and security awareness training to stop unwanted or unauthorized activity from occurring?
Preventive
Detective
Corrective
Authoritative
Q: If you ask Microsoft’s Bing AI Chatbox > 15 questions what could happen?
Emotional manipulation
Asks to be called Sydney
Hostility and anger
All of the above
Q: What is the primary purpose of Kerberos?
Confidentiality
Integrity
Authentication
Accountability
Q: In conflict what is best?
Fight
Flight
All of the above
None of the above. Seek different way of engaging
Q: What of below did MIT Technology include in the list of 10 Breakthrough technologies of 2023?
James Webb Space Telescope
Organs on Demand
Ancient DNA analysis
All of the above
Q: What is the best way to manage access policies?
RBAC
ABAC
PBAC
It does not matter
Q: Should you be skeptical about automating certificates?
Yes
No
Always think critically
Q: Which of below are potential challenges for service accounts?
Not assigned to a specific user
Worried about decommissioning & what could happen
Service Account Sprawl
All of the Above
Q: What is the core of security?
Identity
Snakes
Locks
<Enter Your Value>
Q: What is the default RDP port?
443
3389
53
22
Q: What is the purpose of Privileged Access Management (PAM)?
To provide access to all users
Discovery & inventory of all privileged users including admin & service accounts, access controls, session monitoring, governance, centralized password policy to automate management of password lifecycle, endpoint privilege management
Monitor all user activity
To encrypt all data
Q: Active Directory & Azure AD correctly setup automated monitoring for privileged escalation & privileged access management helps
True
False
My head hurts make it stop
None of the Above
Q: Which of below are potential attacks, tools or exposures against Active Directory?
Something they know
Something they believe
Something they have
Something they are
Q: What is a benefit of JIT (Just in Time) or JEA (Just Enough Access)?
Least Privileged, accountability, security, users get when they needed when they need it
Increased complexity
More to configure
Life finds a way
Q: In Linux file permissions what action does the letter “r” allow?
Read/Open
Write
Bleed
Run
Q: What technology enables users to access multiple applications and systems with a single set of login credentials?
Single Sign On (SSO)
Multi-Factor Authentication (MFA)
Identity Universe
Cat Hurder
Q: Where does the term “scrum” originate from?
Pond water
Rugby
Basement Stairs
None of the Above
Q: What is SCIM?
System for cross domain identity management
Sloths crossing invisible mountains
Smart control for identity management
Seamless collaboration for identity management
Submit Quiz
Thank You For Completing The Quiz
Your score is:
Identity Access Management
Health Check
Contact Us